CVE-2025-1736
PHP vulnerability analysis and mitigation

Overview

CVE-2025-1736 affects PHP versions from 8.1. before 8.1.32, 8.2. before 8.2.28, 8.3. before 8.3.19, and 8.4. before 8.4.5. The vulnerability involves insufficient validation of end-of-line characters when handling user-supplied headers, which can result in certain headers being prevented from being sent or being misinterpreted (PHP Advisory).

Technical details

The vulnerability stems from a header check implementation in the checkhasheader function that fails to properly verify \r characters, only checking for \n in header values. This can be exploited when header values come from user input, such as cookie values. For example, an attacker could inject a payload like Cookie: x=y\nauhtorization:x\r\n which could interfere with header processing. The vulnerability has been assigned a CVSS 4.0 Base Score of 6.3 (Medium) with vector string CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N (NVD).

Impact

The primary impact of this vulnerability is the potential prevention of authorization headers from being sent, which could lead to denial of service conditions. Additionally, the vulnerability can affect other headers such as user-agent and similar checked headers, potentially leading to security implications through header misinterpretation (PHP Advisory).

Mitigation and workarounds

The vulnerability has been patched in PHP versions 8.1.32, 8.2.28, 8.3.19, and 8.4.5. Users should upgrade to these patched versions to mitigate the vulnerability (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management