CVE-2025-1219

Publication date 14 March 2025

Last updated 17 April 2025


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
14.04 LTS trusty
Needs evaluation
php7.0 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
16.04 LTS xenial
Needs evaluation
php7.2 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Needs evaluation
php7.4 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 7.4.3-4ubuntu2.29
php8.1 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 8.1.2-1ubuntu2.21
20.04 LTS focal Not in release
php8.3 25.04 plucky Not in release
24.10 oracular
Fixed 8.3.11-0ubuntu0.24.10.5
24.04 LTS noble
Fixed 8.3.6-0ubuntu0.24.04.4
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
php8.4 25.04 plucky
Fixed 8.4.5-1
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release

Notes


sbeattie

PEAR issues should go against php-pear as of xenial

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N