CVE-2024-8927
PHP vulnerability analysis and mitigation

Overview

CVE-2024-8927 affects PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, and 8.3.* before 8.3.12. The vulnerability relates to the HTTP_REDIRECT_STATUS variable used to check whether a CGI binary is being run by the HTTP server. This security flaw allows attackers to bypass the cgi.force_redirect configuration option through manipulation of HTTP headers (PHP Advisory).

Technical details

The vulnerability exists in the PHP CGI implementation where both REDIRECT_STATUS and HTTP_REDIRECT_STATUS environment variables are considered valid while cgi.force_redirect is enabled. The security issue arises because the Redirect-Status header can be converted to the HTTP_REDIRECT_STATUS environment variable, allowing attackers to bypass the cgi.force_redirect restriction through HTTP headers. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (PHP Advisory).

Impact

While this vulnerability doesn't pose significant security risks in most common configurations, certain configurations that modify the SCRIPT_FILENAME environment variable may be vulnerable to arbitrary file inclusion in PHP. The primary impact is the potential bypass of security restrictions intended to prevent direct access to PHP CGI binaries (PHP Advisory, Security Online).

Mitigation and workarounds

The vulnerability has been patched in PHP versions 8.1.30, 8.2.24, and 8.3.12. Users are strongly recommended to update their PHP installations to these patched versions immediately to address this security issue (Security Online).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-61676MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2025-61674MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2026-21896MEDIUM5.8
  • PHPPHP
  • getkirby/cms
NoYesJan 08, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management