Логотип exploitDog
bind:CVE-2025-34061
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34061

Количество 3

Количество 3

nvd логотип

CVE-2025-34061

7 месяцев назад

A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.

EPSS: Средний
github логотип

GHSA-2mv3-3vpm-p5pm

7 месяцев назад

A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.

EPSS: Средний
fstec логотип

BDU:2025-08218

7 месяцев назад

Уязвимость платформы разработки веб-приложений на PHP PHPStudy, связанная с некорректным кодированием HTTP-заголовка Accept-Charset, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34061

A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.

59%
Средний
7 месяцев назад
github логотип
GHSA-2mv3-3vpm-p5pm

A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.

59%
Средний
7 месяцев назад
fstec логотип
BDU:2025-08218

Уязвимость платформы разработки веб-приложений на PHP PHPStudy, связанная с некорректным кодированием HTTP-заголовка Accept-Charset, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
59%
Средний
7 месяцев назад

Уязвимостей на страницу