{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-8925","assignerOrgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","state":"PUBLISHED","assignerShortName":"php","dateReserved":"2024-09-17T03:59:29.523Z","datePublished":"2024-10-08T03:35:02.673Z","dateUpdated":"2025-11-03T22:33:05.003Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"PHP","vendor":"PHP Group","versions":[{"lessThan":"8.1.30","status":"affected","version":"8.1.*","versionType":"semver"},{"lessThan":"8.2.24","status":"affected","version":"8.2.*","versionType":"semver"},{"lessThan":"8.3.12","status":"affected","version":"8.3.*","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Mihail Kirov"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>In PHP versions<span style=\"background-color: var(--wht);\">&nbsp;8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, e</span>rroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.&nbsp;</p><br><br>"}],"value":"In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior."}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","shortName":"php","dateUpdated":"2024-10-08T03:35:02.673Z"},"references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32"}],"source":{"discovery":"EXTERNAL"},"title":"Erroneous parsing of multipart form data","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-444","lang":"en","description":"CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"}]}],"affected":[{"vendor":"php","product":"php","cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"8.1.0","status":"affected","lessThan":"8.1.30","versionType":"semver"},{"version":"8.2.0","status":"affected","lessThan":"8.2.24","versionType":"semver"},{"version":"8.3.0","status":"affected","lessThan":"8.3.12","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-08T12:56:50.614930Z","id":"CVE-2024-8925","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T17:56:24.654Z"}},{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20241101-0003/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00011.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:33:05.003Z"}}]}}