
Cloud Vulnerability DB
A community-led vulnerabilities database
CodeIgniter, a PHP full-stack web framework, disclosed a vulnerability (CVE-2025-24013) prior to version 4.5.8. The vulnerability stems from improper header validation for names and values in the Header class. This security issue was discovered and disclosed on January 20, 2025 (NVD, GitHub Advisory).
The vulnerability arises from a lack of proper validation in the Header class for header names and values. An attacker can construct deliberately malformed headers that could potentially bypass standard validation mechanisms. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network accessibility with low attack complexity and no required privileges or user interaction (NVD).
The exploitation of this vulnerability could lead to disruption of application functionality, potentially causing errors or generating invalid HTTP requests. In more severe scenarios, it might result in a Denial of Service (DoS) situation if a remote service's web application firewall interprets the malformed requests as malicious and blocks further communication with the application (GitHub Advisory).
The primary mitigation is to upgrade to CodeIgniter version 4.5.8 or later, which includes a patch for this vulnerability. As a temporary workaround, users can implement validation of HTTP header keys and values if using user-supplied values before passing them to the Header class (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."