Vulnerability DatabaseGHSA-27qh-8cxx-2cr5

GHSA-27qh-8cxx-2cr5
AWS SDK for PHP vulnerability analysis and mitigation

Summary

This notification is related to the CloudFront signing utilities in the AWS SDK for PHP, which are used to generate Amazon CloudFront signed URLs and signed cookies. A defense-in-depth enhancement has been implemented to improve handling of special characters, such as double quotes and backslashes, in input values.

Impact

The CloudFront signing utilities build policy documents that define access restrictions for signed URLs and cookies. If an application passes unsanitized input containing special characters to these utilities, the resulting policy document may not reflect the application's intended access restrictions. While the SDK was functioning safely within the requirements of the shared responsibility model, additional safeguards have been added to support secure customer implementations. Applications that already follow AWS security best practices for input validation are not impacted.

Impacted versions: 3.11.7 - 3.371.3

Patches

On 3/3/2026, an enhancement was made to the AWS SDK for PHP version 3.371.4. The enhancement ensures that special characters in input values are correctly handled. It is recommended to upgrade to the latest version.

Workarounds

No workarounds are needed, but customers should ensure that the application is following security best practices:

  • Implement proper input validation in application code before passing values to CloudFront signing utilities
  • Update to the latest AWS SDK release on a regular basis
  • Follow AWS security best practices for SDK configuration

References

For any questions or comments about this advisory, it is recommended to contact AWS Security via the vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

Acknowledgement

The Amazon Inspector Security Research team is thanked for identifying this issue and working through the coordinated process.


SourceNVD

Related AWS SDK for PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2015-5723HIGH7.8
  • PHPPHP
  • php-ZendFramework-Db-Adapter-Pdo
NoYesJun 07, 2016
GHSA-27qh-8cxx-2cr5HIGH7.7
  • AWS SDK for PHPAWS SDK for PHP
  • aws/aws-sdk-php
NoYesMar 27, 2026
CVE-2025-14761MEDIUM6
  • PHPPHP
  • aws/aws-sdk-php
NoYesDec 17, 2025
CVE-2023-51651LOW3.3
  • PHPPHP
  • composer://aws/aws-sdk-php
NoYesDec 22, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management