Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14180

CVE-2025-14180: PHP PDO PostgreSQL DoS Vulnerability

CVE-2025-14180 is a denial of service flaw in PHP's PDO PostgreSQL driver that causes null pointer dereference and crashes. This article covers the technical details, affected PHP versions, impact, and mitigation strategies.

Published: April 1, 2026

CVE-2025-14180 Overview

CVE-2025-14180 is a null pointer dereference vulnerability affecting multiple versions of PHP when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled. An invalid character sequence (such as \\x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in the pdo_parse_params() function. This vulnerability can result in application crashes (segmentation faults) and significantly impact server availability.

Critical Impact

This vulnerability enables remote attackers to crash PHP applications using PostgreSQL PDO connections, leading to denial of service conditions that can disrupt web services and backend systems.

Affected Products

  • PHP versions 8.1.* before 8.1.34
  • PHP versions 8.2.* before 8.2.30
  • PHP versions 8.3.* before 8.3.29
  • PHP versions 8.4.* before 8.4.16
  • PHP versions 8.5.* before 8.5.1

Discovery Timeline

  • 2025-12-27 - CVE-2025-14180 published to NVD
  • 2026-01-09 - Last updated in NVD database

Technical Details for CVE-2025-14180

Vulnerability Analysis

This vulnerability is classified as CWE-476 (NULL Pointer Dereference) and affects the PHP PDO PostgreSQL driver's parameter parsing functionality. When PDO::ATTR_EMULATE_PREPARES is enabled, PHP emulates prepared statements by performing parameter substitution locally rather than sending parameterized queries to the PostgreSQL server. During this process, user-supplied parameters must be properly escaped using the PQescapeStringConn function from the libpq library.

The vulnerability arises when an attacker supplies a malformed character sequence (such as \\x99) that causes PQescapeStringConn to fail and return NULL. The pdo_parse_params() function fails to properly validate this return value before dereferencing the pointer, resulting in a segmentation fault that crashes the PHP process.

Root Cause

The root cause is insufficient null pointer validation in the pdo_parse_params() function within the PDO PostgreSQL driver. When PQescapeStringConn encounters an invalid multi-byte character sequence that cannot be properly escaped according to the PostgreSQL encoding rules, it returns NULL to indicate failure. The PHP code path fails to check for this NULL return value before attempting to use the result, leading to the null pointer dereference.

Attack Vector

The attack vector is network-based, requiring an attacker to submit crafted input containing invalid character sequences to a PHP application that uses PDO PostgreSQL with emulated prepared statements. The attack requires specific conditions to be met:

  1. The target application must use the PDO PostgreSQL driver
  2. PDO::ATTR_EMULATE_PREPARES must be enabled (not the default)
  3. User-controlled input must reach a prepared statement parameter
  4. The input must contain specific invalid byte sequences that trigger the PQescapeStringConn failure

When exploited successfully, the PHP process crashes with a segmentation fault, terminating all active requests and potentially affecting service availability until the process is restarted.

Detection Methods for CVE-2025-14180

Indicators of Compromise

  • Unexpected PHP process crashes or segmentation faults in server logs
  • Repeated restarts of PHP-FPM or Apache mod_php processes
  • Application error logs showing connection failures to PostgreSQL-backed services
  • Unusual patterns of HTTP requests containing non-printable or malformed characters targeting form inputs or API endpoints

Detection Strategies

  • Monitor PHP error logs and system logs for segmentation fault events associated with PHP processes
  • Implement web application firewall (WAF) rules to detect and block requests containing suspicious byte sequences like \\x99
  • Review PHP configuration files for PDO::ATTR_EMULATE_PREPARES usage in PostgreSQL connections
  • Deploy application-level logging to capture input validation failures and unusual character encodings

Monitoring Recommendations

  • Configure alerting for abnormal PHP process termination rates
  • Monitor server availability metrics and set thresholds for automatic incident response
  • Implement request logging with full payload capture for forensic analysis
  • Track connection pool exhaustion events that may indicate exploitation attempts

How to Mitigate CVE-2025-14180

Immediate Actions Required

  • Upgrade PHP to a patched version: 8.1.34, 8.2.30, 8.3.29, 8.4.16, or 8.5.1 or later
  • Disable PDO::ATTR_EMULATE_PREPARES for PostgreSQL connections to use native prepared statements
  • Implement input validation to reject or sanitize invalid character sequences before database operations
  • Deploy rate limiting to reduce the impact of exploitation attempts

Patch Information

PHP has released security patches for all affected version branches. Organizations should upgrade to the following minimum versions:

BranchPatched Version
PHP 8.18.1.34
PHP 8.28.2.30
PHP 8.38.3.29
PHP 8.48.4.16
PHP 8.58.5.1

For detailed patch information, refer to the PHP Security Advisory on GitHub.

Workarounds

  • Disable PDO::ATTR_EMULATE_PREPARES by setting it to false when creating PDO connections to PostgreSQL
  • Implement strict input validation to filter out invalid byte sequences before they reach database queries
  • Deploy a web application firewall with rules to detect and block malformed character payloads
  • Use process supervision tools to automatically restart crashed PHP processes while applying permanent fixes
php
// Recommended PDO configuration to disable emulated prepares
$pdo = new PDO('pgsql:host=localhost;dbname=mydb', $user, $pass);
$pdo->setAttribute(PDO::ATTR_EMULATE_PREPARES, false);
$pdo->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechPhp

  • SeverityHIGH

  • CVSS Score8.2

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2025-6491: PHP SOAP Extension DoS Vulnerability

  • CVE-2025-1735: PHP pgsql/pdo_pgsql DOS Vulnerability

  • CVE-2024-2757: PHP mb_encode_mimeheader DoS Vulnerability

  • CVE-2023-0662: PHP HTTP Form Upload DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English