CVE-2024-8926

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

03 Nov 2025, 23:17

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241101-0003/ -

Information

Published : 2024-10-08 04:15

Updated : 2025-11-03 23:17


NVD link : CVE-2024-8926

Mitre link : CVE-2024-8926

CVE.ORG link : CVE-2024-8926


JSON object : View

Products Affected

php

  • php
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')