Vulnerability Database

290,301

Total vulnerabilities in the database

CVE-2015-6527

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

  • Published: Jan 19, 2016
  • Updated: Apr 13, 2023
  • CVE: CVE-2015-6527
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.3
  • AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v2:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/Au:N/C:P/I:P/A:P

No CWE or OWASP classifications available.

Software From Fixed in
php / php 7.0.0 7.0.0.x
php / php 7.0.0-alpha1 7.0.0-alpha1.x
php / php 7.0.0-alpha2 7.0.0-alpha2.x
php / php 7.0.0-beta1 7.0.0-beta1.x
php / php 7.0.0-beta2 7.0.0-beta2.x
php / php 7.0.0-beta3 7.0.0-beta3.x
php / php 7.0.0-rc1 7.0.0-rc1.x
php / php 7.0.0-rc2 7.0.0-rc2.x
php / php 7.0.0-rc3 7.0.0-rc3.x
php / php 7.0.0-rc4 7.0.0-rc4.x
php / php 7.0.0-rc5 7.0.0-rc5.x
php / php 7.0.0-rc6 7.0.0-rc6.x
php / php 7.0.0-rc7 7.0.0-rc7.x
php / php 7.0.0-rc8 7.0.0-rc8.x