CVE-2024-11235

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

30 Apr 2025, 19:25

Type Values Removed Values Added
References () https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 - () https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 - Exploit, Vendor Advisory
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
First Time Php
Php php
CWE CWE-416

04 Apr 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-04 18:15

Updated : 2025-04-30 19:25


NVD link : CVE-2024-11235

Mitre link : CVE-2024-11235


JSON object : View

Products Affected

php

  • php
CWE
CWE-416

Use After Free