Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6255-1 | php8.2 security update |
Debian DSA |
DSA-6256-1 | php8.4 security update |
Tue, 12 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Php
Php php |
|
| CPEs | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Php
Php php |
|
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Php Group
Php Group php |
|
| Vendors & Products |
Php Group
Php Group php |
Sun, 10 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements. | |
| Title | SQL injection in pdo_firebird via NUL bytes in quoted strings | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: php
Published:
Updated: 2026-05-11T15:23:35.010Z
Reserved: 2025-12-06T06:34:43.979Z
Link: CVE-2025-14179
Updated: 2026-05-11T15:23:31.146Z
Status : Analyzed
Published: 2026-05-10T05:16:09.853
Modified: 2026-05-12T17:48:38.497
Link: CVE-2025-14179
No data.
OpenCVE Enrichment
Updated: 2026-05-10T06:30:05Z
Debian DSA