HomePhpCVE-2023-3823

CVE-2023-3823

HIGH
8.6CVSS
Published: 2023-08-11
Updated: 2025-02-13
AI Analysis

Description

In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
low
Availability
low
Weaknesses
CWE-611

Metadata

Primary Vendor
PHP
Published
8/11/2023
Last Modified
2/13/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

php : phpphp : phpphp : phpfedoraproject : fedoradebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-3823 | HIGH Severity | CVEDatabase.com | CVEDatabase.com