Unrated severityNVD Advisory· Published Jun 9, 2024· Updated Nov 3, 2025
Filter bypass in filter_var (FILTER_VALIDATE_URL)
CVE-2024-5458
Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.openwall.com/lists/oss-security/2024/06/07/1mitre
- github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27wmitre
- lists.debian.org/debian-lts-announce/2024/06/msg00009.htmlmitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/mitre
- security.netapp.com/advisory/ntap-20240726-0001/mitre
News mentions
0No linked articles in our index yet.