Innovate faster and cut risk with PHP experts from Zend Services.
Explore Services
See How Zend Helps Leading Hosting Providers Keep Their Managed Sites on Secure PHP
Read More
Learn PHP from PHP experts with free, on-demand, and instructor led courses.
Explore Training
Submit support requests and browse self-service resources.
Explore Support
libxml streams use wrong content-type header when requesting a redirected resource.
In PHP versions 8.1.* before 8.1.32, 8.2.* before 8.2.28, 8.3.* before 8.3.19, and 8.4.* before 8.4.5, a vulnerability, which was classified as problematic, has been found. Affected by this issue is some unknown processing of the component Header Handler. The manipulation of the argument Content-Type with an unknown input leads to a redirect vulnerability. This can occur when a web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. Impacted is integrity.
Always validate user input, and consider not allowing users to provide redirect URLs via form input without validation.
Otherwise, we recommend upgrading to a known patched version of PHP.
Direct link to CVE-2025-1219 >
< View all CVEs