A critical remote code execution (RCE) vulnerability, CVE-2024-4577, impacting Windows-based PHP installations configured to use PHP-CGI, is actively being exploited.
This PHP-CGI argument injection flaw enables unauthenticated attackers to execute arbitrary commands, potentially leading to full system compromise.
Technical Details
The vulnerability stems from improper handling of Unicode and special characters by the PHP CGI module on Windows, leading to unintended interpretation of user-supplied command line parameters.
Attackers exploit this behavior to inject arbitrary PHP options, revealing source code, executing commands remotely, and achieving persistent system-level access.
Current Threat Landscape
Mass exploitation campaigns leveraging this vulnerability have escalated globally, particularly impacting organizations in the United States, Japan, Singapore, Germany, and China.
Over 1,000 unique IP addresses conducting automated scanning and exploitation attempts have been identified since January 2025. Notable threat actors observed exploiting this flaw include credential-stealing groups and ransomware operators such as TellYouThePass.
Recommendations:
- Immediately update PHP installations to secure versions: PHP 8.3.8, 8.2.20, or 8.1.29 and above.
- Ensure vulnerable systems are patched without delay due to the high likelihood of active exploitation.
- Implement enhanced monitoring, particularly on PHP-CGI deployments in Windows environments, to detect and respond swiftly to exploitation attempts.
- Follow cybersecurity best practices, including isolating web-facing applications, consolidating and actively monitoring Internet gateways, and regularly patching all operating systems and software.