
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-1734 is a vulnerability discovered in PHP affecting multiple versions: 8.1. before 8.1.32, 8.2. before 8.2.28, 8.3. before 8.3.19, and 8.4. before 8.4.5. The vulnerability was identified on February 27, 2025, and involves the HTTP server header handling mechanism where headers missing a colon (:) are incorrectly treated as valid headers (CVE Mitre).
The vulnerability is classified as an Improper Input Validation (CWE-20) issue. When receiving headers from an HTTP server, the PHP implementation fails to properly validate header formats, accepting headers without the required colon separator as valid. The vulnerability has been assigned a CVSS 4.0 Base Score of 6.3 (Medium) with the vector string CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N (NVD).
The vulnerability can lead to applications accepting invalid headers, potentially causing parsing issues in applications that process HTTP headers. This could result in security implications where applications might misinterpret header values or treat invalid headers as continuations of previous ones, potentially enabling request smuggling attacks (GitHub Advisory).
Fixed versions have been released: PHP 8.1.32, 8.2.28, 8.3.19, and 8.4.5. As a workaround, users can implement additional validation of the $httpresponseheader array in their applications. Several Linux distributions have also released security updates, including Debian with versions 7.4.33-1+deb11u8 for bullseye and 8.2.28-1~deb12u1 for bookworm (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."