Innovate faster and cut risk with PHP experts from Zend Services.
Explore Services
See How Zend Helps Leading Hosting Providers Keep Their Managed Sites on Secure PHP
Read More
Learn PHP from PHP experts with free, on-demand, and instructor led courses.
Explore Training
Submit support requests and browse self-service resources.
Explore Support
Reference counting in `php_request_shutdown` causes Use-After-Free.
A vulnerability classified as critical was found in PHP up to 8.3.18/8.4.4. Affected by this vulnerability is the function php_request_shutdown. The manipulation with an unknown input leads to a use after free vulnerability. The CWE definition for the vulnerability is CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. As an impact it is known to affect confidentiality, integrity, and availability.
There is no known workaround for CVE-2024-11235; We recommend upgrading to a known patched version of PHP.
Direct link to CVE-2024-11235 >
< View all CVEs