Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g966-83w7-6w38 | FrankenPHP's unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FrankenPHP |
Fri, 20 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:php:frankenphp:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Php
Php frankenphp |
|
| Vendors & Products |
Php
Php frankenphp |
Thu, 12 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FrankenPHP is a modern application server for PHP. Prior to 1.11.2, FrankenPHP’s CGI path splitting logic improperly handles Unicode characters during case conversion. The logic computes the split index (for finding .php) on a lowercased copy of the request path but applies that byte index to the original path. Because strings.ToLower() in Go can increase the byte length of certain UTF-8 characters (e.g., Ⱥ expands when lowercased), the computed index may not align with the correct position in the original string. This results in an incorrect SCRIPT_NAME and SCRIPT_FILENAME, potentially causing FrankenPHP to execute a file other than the one intended by the URI. This vulnerability is fixed in 1.11.2. | |
| Title | FrankenPHP affected by Path Confusion via Unicode casing in CGI path splitting allows execution of arbitrary files | |
| Weaknesses | CWE-180 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T20:04:07.435Z
Reserved: 2026-01-27T19:35:20.529Z
Link: CVE-2026-24895
Updated: 2026-02-12T20:03:56.900Z
Status : Analyzed
Published: 2026-02-12T20:16:10.170
Modified: 2026-02-20T18:30:00.857
Link: CVE-2026-24895
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:15:26Z
Github GHSA