The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14177

CVE-2025-14177: PHP getimagesize() Info Disclosure Bug

CVE-2025-14177 is an information disclosure flaw in PHP's getimagesize() function that leaks uninitialized heap memory into image segments. This article covers technical details, affected versions, and mitigation.

Published: April 1, 2026

CVE-2025-14177 Overview

CVE-2025-14177 is an uninitialized memory use vulnerability affecting multiple versions of PHP. The vulnerability exists in the getimagesize() function, which may leak uninitialized heap memory into APPn segments (e.g., APP1) when reading images in multi-chunk mode, such as via php://filter. This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. Successful exploitation may lead to information disclosure of sensitive heap data, compromising the confidentiality of the target server.

Critical Impact

Attackers can potentially extract sensitive heap data from PHP servers by exploiting the uninitialized memory leak in image processing functions, leading to information disclosure that could expose credentials, session tokens, or other confidential data stored in memory.

Affected Products

  • PHP versions 8.1.* before 8.1.34
  • PHP versions 8.2.* before 8.2.30
  • PHP versions 8.3.* before 8.3.29
  • PHP versions 8.4.* before 8.4.16
  • PHP versions 8.5.* before 8.5.1

Discovery Timeline

  • 2025-12-27 - CVE-2025-14177 published to NVD
  • 2026-01-08 - Last updated in NVD database

Technical Details for CVE-2025-14177

Vulnerability Analysis

This vulnerability is classified as CWE-125 (Out-of-Bounds Read), though it specifically manifests as an uninitialized heap memory disclosure issue. The root problem lies in the php_read_stream_all_chunks() function's buffer handling logic when processing image data in multi-chunk mode.

When PHP processes images through stream wrappers like php://filter, the getimagesize() function reads image data in chunks. The vulnerable code path incorrectly overwrites the buffer without properly advancing the write pointer, causing subsequent reads to include tail bytes that were never initialized with valid data. These uninitialized bytes contain whatever data previously resided in that heap memory location, potentially including sensitive information from prior operations.

The attack surface is network-accessible and requires no authentication, though exploitation complexity is elevated due to the need for specific conditions to trigger the vulnerable code path. The vulnerability affects only confidentiality, with no direct impact on integrity or availability.

Root Cause

The vulnerability stems from a logic error in php_read_stream_all_chunks() within the PHP source code. When reading image data in multi-chunk mode, the function overwrites the buffer contents but fails to advance the buffer pointer accordingly. This implementation flaw results in the tail portion of the buffer remaining uninitialized, containing stale heap data from previous memory allocations. When the APPn segment data is subsequently processed and returned, these uninitialized bytes are included in the output, leaking heap contents to the attacker.

Attack Vector

Exploitation of CVE-2025-14177 requires an attacker to cause a vulnerable PHP server to process a specially crafted image file through the getimagesize() function using multi-chunk reading mode. This can be achieved through:

  1. Uploading a malicious image to a web application that processes images using getimagesize()
  2. Triggering image processing through php://filter stream wrappers
  3. Manipulating image metadata to force multi-chunk processing

The vulnerability exists when the server processes image files through stream wrappers in multi-chunk mode. The attacker crafts an image that triggers the vulnerable code path, causing uninitialized heap memory to be included in the APPn segment response data. The leaked memory contents could reveal sensitive information such as session identifiers, database credentials, encryption keys, or other confidential data that was previously stored in the same heap region.

For detailed technical information, see the PHP Security Advisory on GitHub.

Detection Methods for CVE-2025-14177

Indicators of Compromise

  • Unusual patterns in image processing requests using php://filter stream wrappers
  • Excessive calls to getimagesize() with non-standard stream inputs
  • Unexpected data patterns in image metadata responses indicating memory leakage
  • Log entries showing repeated image processing failures or anomalies

Detection Strategies

  • Monitor PHP error logs for anomalies related to getimagesize() function calls
  • Implement application-layer monitoring for suspicious use of php://filter in image processing contexts
  • Deploy web application firewalls (WAF) with rules to detect attempts to exploit stream wrapper vulnerabilities
  • Use SentinelOne Singularity platform to detect unusual memory access patterns in PHP processes

Monitoring Recommendations

  • Enable verbose logging for PHP image processing functions to capture potential exploitation attempts
  • Configure alerts for unusual patterns in APPn segment data sizes or content
  • Monitor for reconnaissance activities targeting PHP version fingerprinting
  • Implement file integrity monitoring on PHP configuration files to detect unauthorized changes

How to Mitigate CVE-2025-14177

Immediate Actions Required

  • Update PHP to the patched versions: 8.1.34, 8.2.30, 8.3.29, 8.4.16, or 8.5.1 depending on your installed branch
  • Audit applications for use of getimagesize() with stream wrappers, particularly php://filter
  • Implement input validation to restrict image processing to trusted file sources
  • Consider temporarily disabling or restricting stream wrapper usage in image processing until patches are applied

Patch Information

PHP has released security patches addressing this vulnerability across all affected version branches. Organizations should upgrade to the following minimum versions to remediate CVE-2025-14177:

PHP BranchPatched Version
8.1.x8.1.34
8.2.x8.2.30
8.3.x8.3.29
8.4.x8.4.16
8.5.x8.5.1

For additional details, refer to the PHP Security Advisory.

Workarounds

  • Restrict access to getimagesize() function through PHP disable_functions directive where not required
  • Implement application-level filtering to prevent use of php://filter with image processing functions
  • Use alternative image processing libraries that do not rely on the affected PHP functions
  • Deploy network-level controls to limit exposure of vulnerable PHP applications
bash
# PHP configuration hardening example (php.ini)
# Disable stream wrappers for image processing if not required
allow_url_fopen = Off

# Restrict dangerous functions if getimagesize() is not needed
# Note: Only disable if your application does not require these functions
disable_functions = getimagesize

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechPhp

  • SeverityMEDIUM

  • CVSS Score6.3

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-125
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2025-52023: Gems CMS Information Disclosure Vulnerability

  • CVE-2025-52022: GemS Loyalty Error Message Disclosure Flaw

  • CVE-2024-9026: PHP-FPM Information Disclosure Vulnerability

  • CVE-2024-8929: PHP Information Disclosure Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English