{"uuid": "84aa5b6b-a874-490b-8da7-230f7989d94a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1861", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9544", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1861\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.\n\ud83d\udccf Published: 2025-03-30T05:57:57.894Z\n\ud83d\udccf Modified: 2025-03-30T05:57:57.894Z\n\ud83d\udd17 References:\n1. https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff", "creation_timestamp": "2025-03-30T06:32:00.000000Z"}