Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4577: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in PHP Group PHP

0
Critical
VulnerabilityCVE-2024-4577cvecve-2024-4577cwe-78
Published: Sun Jun 09 2024 (06/09/2024, 19:42:36 UTC)
Source: CVE Database V5
Vendor/Project: PHP Group
Product: PHP

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:20:48 UTC

Technical Analysis

CVE-2024-4577 is an OS command injection vulnerability classified under CWE-78 that affects PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, and 8.3.* before 8.3.8. The flaw occurs specifically when PHP is run as a CGI module under Apache on Windows systems configured with certain code pages. Windows employs a 'Best-Fit' character replacement mechanism for command-line arguments passed to Win32 API functions, which can cause the PHP CGI module to misinterpret these replaced characters as command-line options for the PHP binary. This misinterpretation allows an unauthenticated attacker to inject arbitrary PHP options, potentially revealing the source code of PHP scripts or executing arbitrary PHP code on the server. The vulnerability does not require any privileges or user interaction and can be exploited remotely over the network. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, highlighting its high impact on confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the vulnerability poses a significant risk to web servers running vulnerable PHP versions on Windows. The issue arises from the interaction between Windows code page handling and PHP CGI's command-line parsing, making it a platform and configuration-specific problem. Remediation involves upgrading PHP to fixed versions 8.1.29, 8.2.20, or 8.3.8 or later, or applying vendor-provided patches once available.

Potential Impact

The impact of CVE-2024-4577 is severe for organizations running vulnerable PHP versions on Windows servers with Apache and PHP-CGI configurations. Exploitation can lead to full disclosure of PHP source code, which may expose sensitive information such as database credentials, API keys, and business logic. Additionally, attackers can execute arbitrary PHP code remotely without authentication, potentially leading to complete server compromise, data theft, defacement, or use of the server as a pivot point for further attacks. The vulnerability affects confidentiality, integrity, and availability simultaneously, making it a critical risk. Organizations relying on PHP-based web applications on Windows platforms are particularly vulnerable, especially those with public-facing web servers. The ease of exploitation (no privileges or user interaction required) increases the likelihood of attacks once exploit code becomes available. This can disrupt business operations, damage reputation, and incur regulatory penalties if sensitive data is exposed.

Mitigation Recommendations

To mitigate CVE-2024-4577, organizations should immediately upgrade PHP to versions 8.1.29, 8.2.20, 8.3.8, or later, where the vulnerability is patched. If immediate upgrade is not feasible, consider disabling PHP-CGI on Windows or switching to PHP-FPM or other supported SAPIs that do not exhibit this behavior. Review and restrict the use of code pages on Windows servers to avoid triggering the 'Best-Fit' character replacement behavior. Implement strict input validation and sanitization on web applications to reduce the risk of injection attacks. Employ web application firewalls (WAFs) with rules targeting suspicious command-line injection patterns. Monitor server logs for unusual PHP command-line options or unexpected CGI invocations. Limit network exposure of vulnerable servers by using network segmentation and access controls. Regularly audit and update server configurations and software to maintain security hygiene. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
php
Date Reserved
2024-05-06T22:21:01.742Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26b7f

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/27/2026, 10:20:48 PM

Last updated: 3/25/2026, 1:30:53 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses