First published: Thu Aug 03 2023(Updated: )
<a href="https://www.php.net/ChangeLog-8.php#8.0.30">https://www.php.net/ChangeLog-8.php#8.0.30</a> Libxml: Fixed bug GHSA-3qrf-m4j2-pcrr (Security issue with external entity loading in XML without enabling it). (<a href="https://access.redhat.com/security/cve/CVE-2023-3823">CVE-2023-3823</a>)
Credit: security@php.net security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php7.4 | 7.4.33-1+deb11u5 | |
debian/php8.2 | 8.2.20-1~deb12u1 8.2.23-1 | |
redhat/php | <8.2.9 | 8.2.9 |
redhat/php | <8.1.22 | 8.1.22 |
redhat/php | <8.0.30 | 8.0.30 |
PHP | >=8.0.0<8.0.30 | |
PHP | >=8.1.0<8.1.22 | |
PHP | >=8.2.0<8.2.8 | |
PHP | <8.0.30 | 8.0.30 |
PHP | >=8.2.0<8.2.9 | |
Fedora | =38 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-3823.
CVE-2023-3823 has a severity value of 7.5, which is considered high.
PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 are affected by CVE-2023-3823.
To fix CVE-2023-3823, upgrade to PHP version 8.2.9 or higher.
You can find more information about CVE-2023-3823 in the [PHP ChangeLog](https://www.php.net/ChangeLog-8.php#8.2.9), [CVE Details](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823), and [GitHub Advisory](https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr).