CVE-2025-14180

HIGH

PHP <8.1.34, <8.2.30, <8.3.29, <8.4.16, <8.5.1 - Buffer Overflow

Title source: llm
STIX 2.1

Description

In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.

Exploits (1)

github WORKING POC
by gl1tch0x1 · shellpoc
https://github.com/gl1tch0x1/PHP_8.1.x_Exploit

References (1)

Core 1

Scores

CVSS v3 7.5
EPSS 0.0004
EPSS Percentile 12.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-476
Status published
Products (1)
php/php 8.1.0 - 8.1.34
Published Dec 27, 2025
Tracked Since Feb 18, 2026