CVE-2025-34061: CWE-94 Improper Control of Generation of Code ('Code Injection') in Henan Xiaopi Security Technology Co., Ltd. PHPStudy
A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.
AI Analysis
Technical Summary
CVE-2025-34061 is a critical remote code execution vulnerability affecting PHPStudy versions from 2016 through 2018, developed by Henan Xiaopi Security Technology Co., Ltd. The vulnerability arises from an embedded backdoor within PHPStudy that listens for specially crafted HTTP requests containing base64-encoded PHP payloads in the Accept-Charset header. Upon receiving such a request, the backdoor decodes and executes the PHP code without any validation or authentication, allowing unauthenticated remote attackers to execute arbitrary PHP code with the privileges of the web server user. This vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the software improperly controls the generation or execution of code, leading to code injection. The CVSS v4.0 score of 9.3 reflects the critical nature of this flaw, highlighting its ease of exploitation (no authentication or user interaction required), network attack vector, and high impact on confidentiality, integrity, and availability. The vulnerability affects PHPStudy versions released in 2016, which is a popular PHP development environment and server stack used primarily in China but also by developers worldwide. Although no public exploits have been reported yet, the presence of a backdoor that executes arbitrary code remotely poses a severe risk of system compromise, data theft, defacement, or pivoting within affected networks. The lack of official patches or mitigation guidance from the vendor further exacerbates the threat landscape for users of these PHPStudy versions.
Potential Impact
For European organizations, this vulnerability represents a significant risk, especially for those using PHPStudy 2016 in development, testing, or production environments. Successful exploitation could lead to full compromise of web servers, enabling attackers to steal sensitive data, deploy ransomware, or establish persistent footholds. Given PHPStudy’s role in web application development, compromised systems could serve as launchpads for attacks against internal networks or customers. The vulnerability’s unauthenticated and remote nature means attackers can exploit it over the internet without prior access, increasing exposure. European organizations involved in software development, web hosting, or managed services that rely on PHPStudy are particularly vulnerable. Additionally, the lack of patches means organizations must rely on alternative mitigations, increasing operational complexity. The impact extends beyond confidentiality to integrity and availability, as attackers could modify or delete data and disrupt services. This could result in regulatory non-compliance under GDPR if personal data is exposed, leading to legal and financial repercussions.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate and specific actions: 1) Identify and inventory all PHPStudy 2016 installations within their environment. 2) Immediately isolate affected systems from public networks to prevent remote exploitation. 3) Replace PHPStudy 2016 with updated, secure PHP development environments or server stacks that do not contain backdoors. 4) Implement strict network-level controls such as web application firewalls (WAFs) configured to block or alert on suspicious HTTP headers, particularly anomalous Accept-Charset values containing base64-encoded data. 5) Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures targeting this backdoor’s communication pattern. 6) Conduct thorough forensic analysis and monitoring for signs of compromise on systems that previously ran PHPStudy 2016. 7) Educate development teams about the risks of using untrusted or outdated software stacks and enforce policies to use only vendor-supported and verified tools. 8) Regularly audit HTTP traffic logs for unusual header usage that could indicate exploitation attempts. These targeted mitigations go beyond generic advice by focusing on detection and containment of the specific backdoor behavior and eliminating the vulnerable software.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-34061: CWE-94 Improper Control of Generation of Code ('Code Injection') in Henan Xiaopi Security Technology Co., Ltd. PHPStudy
Description
A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.
AI-Powered Analysis
Technical Analysis
CVE-2025-34061 is a critical remote code execution vulnerability affecting PHPStudy versions from 2016 through 2018, developed by Henan Xiaopi Security Technology Co., Ltd. The vulnerability arises from an embedded backdoor within PHPStudy that listens for specially crafted HTTP requests containing base64-encoded PHP payloads in the Accept-Charset header. Upon receiving such a request, the backdoor decodes and executes the PHP code without any validation or authentication, allowing unauthenticated remote attackers to execute arbitrary PHP code with the privileges of the web server user. This vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the software improperly controls the generation or execution of code, leading to code injection. The CVSS v4.0 score of 9.3 reflects the critical nature of this flaw, highlighting its ease of exploitation (no authentication or user interaction required), network attack vector, and high impact on confidentiality, integrity, and availability. The vulnerability affects PHPStudy versions released in 2016, which is a popular PHP development environment and server stack used primarily in China but also by developers worldwide. Although no public exploits have been reported yet, the presence of a backdoor that executes arbitrary code remotely poses a severe risk of system compromise, data theft, defacement, or pivoting within affected networks. The lack of official patches or mitigation guidance from the vendor further exacerbates the threat landscape for users of these PHPStudy versions.
Potential Impact
For European organizations, this vulnerability represents a significant risk, especially for those using PHPStudy 2016 in development, testing, or production environments. Successful exploitation could lead to full compromise of web servers, enabling attackers to steal sensitive data, deploy ransomware, or establish persistent footholds. Given PHPStudy’s role in web application development, compromised systems could serve as launchpads for attacks against internal networks or customers. The vulnerability’s unauthenticated and remote nature means attackers can exploit it over the internet without prior access, increasing exposure. European organizations involved in software development, web hosting, or managed services that rely on PHPStudy are particularly vulnerable. Additionally, the lack of patches means organizations must rely on alternative mitigations, increasing operational complexity. The impact extends beyond confidentiality to integrity and availability, as attackers could modify or delete data and disrupt services. This could result in regulatory non-compliance under GDPR if personal data is exposed, leading to legal and financial repercussions.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate and specific actions: 1) Identify and inventory all PHPStudy 2016 installations within their environment. 2) Immediately isolate affected systems from public networks to prevent remote exploitation. 3) Replace PHPStudy 2016 with updated, secure PHP development environments or server stacks that do not contain backdoors. 4) Implement strict network-level controls such as web application firewalls (WAFs) configured to block or alert on suspicious HTTP headers, particularly anomalous Accept-Charset values containing base64-encoded data. 5) Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures targeting this backdoor’s communication pattern. 6) Conduct thorough forensic analysis and monitoring for signs of compromise on systems that previously ran PHPStudy 2016. 7) Educate development teams about the risks of using untrusted or outdated software stacks and enforce policies to use only vendor-supported and verified tools. 8) Regularly audit HTTP traffic logs for unusual header usage that could indicate exploitation attempts. These targeted mitigations go beyond generic advice by focusing on detection and containment of the specific backdoor behavior and eliminating the vulnerable software.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.549Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6866dff66f40f0eb729b623a
Added to database: 7/3/2025, 7:54:30 PM
Last enriched: 7/3/2025, 8:11:05 PM
Last updated: 7/9/2025, 9:11:36 AM
Views: 22
Related Threats
CVE-2025-7529: Stack-based Buffer Overflow in Tenda FH1202
HighCVE-2025-7528: Stack-based Buffer Overflow in Tenda FH1202
HighHistorical Analysis of Reflected Vulnerabilities: The Evolution of Windows Defender Defenses
CriticalCVE-2025-7527: Stack-based Buffer Overflow in Tenda FH1202
HighCVE-2025-7525: Command Injection in TOTOLINK T6
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.