CVE Vulnerabilities

CVE-2025-1220

Server-Side Request Forgery (SSRF)

Published: Jul 13, 2025 | Modified: Nov 04, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

NameVendorStart VersionEnd Version
PhpPhp8.1.0 (including)8.1.33 (excluding)
PhpPhp8.2.0 (including)8.2.29 (excluding)
PhpPhp8.3.0 (including)8.3.23 (excluding)
PhpPhp8.4.0 (including)8.4.10 (excluding)
Red Hat Enterprise Linux 8RedHatphp:8.2-8100020260106091451.f7998665*
Red Hat Enterprise Linux 9RedHatphp:8.3-9070020251002063832.9*
Red Hat Enterprise Linux 9RedHatphp:8.2-9070020260107073439.9*
Php7.0Ubuntuesm-infra/xenial*
Php7.2Ubuntuesm-infra/bionic*
Php7.4Ubuntuesm-infra/focal*
Php8.1Ubuntujammy*
Php8.1Ubuntuupstream*
Php8.3Ubuntunoble*
Php8.3Ubuntuoracular*
Php8.3Ubuntuupstream*
Php8.4Ubuntudevel*
Php8.4Ubuntuplucky*
Php8.4Ubuntuquesting*
Php8.4Ubuntuupstream*

References