🔐 CVE Alert

CVE-2024-4577

CRITICAL 9.8 ⚠️ CISA KEV

Argument Injection in PHP-CGI

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

CWE CWE-78
Vendor php group
Product php
Published Jun 9, 2024
Last Updated Oct 21, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for php group php

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-4577.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

PHP Group / PHP
8.1.* < 8.1.29 8.2.* < 8.2.20 8.3.* < 8.3.8

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv blog.orange.tw: https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html devco.re: https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ arstechnica.com: https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ imperva.com: https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ github.com: https://github.com/11whoami99/CVE-2024-4577 github.com: https://github.com/xcanwin/CVE-2024-4577-PHP-RCE github.com: https://github.com/rapid7/metasploit-framework/pull/19247 labs.watchtowr.com: https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ github.com: https://github.com/watchtowrlabs/CVE-2024-4577 php.net: https://www.php.net/ChangeLog-8.php#8.1.29 php.net: https://www.php.net/ChangeLog-8.php#8.2.20 php.net: https://www.php.net/ChangeLog-8.php#8.3.8 cert.be: https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately isc.sans.edu: https://isc.sans.edu/diary/30994 openwall.com: http://www.openwall.com/lists/oss-security/2024/06/07/1 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ security.netapp.com: https://security.netapp.com/advisory/ntap-20240621-0008/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4577 vicarius.io: https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 vicarius.io: https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 blog.talosintelligence.com: https://blog.talosintelligence.com/new-persistent-attacks-japan/

Credits

🔍 Orange Tsai, DEVCORE Research Team