A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.
History

Mon, 07 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
Description A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.
Title PHPStudy 2016-2018 Backdoor Remote Code Execution Vulnerability
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-03T19:46:03.207Z

Updated: 2025-07-07T19:01:51.371Z

Reserved: 2025-04-15T19:15:22.549Z

Link: CVE-2025-34061

cve-icon Vulnrichment

Updated: 2025-07-07T19:01:46.143Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-03T20:15:21.570

Modified: 2025-07-08T16:19:11.700

Link: CVE-2025-34061

cve-icon Redhat

No data.