In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CVE ID: CVE-2024-4577
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor: PHP Group
Product: PHP
http/cves/2024/CVE-2024-4577.yaml
EPSS Score: 95.38% (probability of being exploited)
EPSS Percentile: 99.55% (scored less or equal to compared to others)
EPSS Date: 2025-03-14 (when was this score calculated)