Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-473 (PHP参数外部修改) — Vulnerability Class 2

2 vulnerabilities classified as CWE-473 (PHP参数外部修改). AI Chinese analysis included.

CWE-473 represents a critical input validation weakness in PHP applications where developers fail to properly restrict or sanitize variables originating from external sources like query parameters, cookies, or POST data. Attackers typically exploit this vulnerability by injecting malicious payloads or manipulating expected variable values, thereby bypassing intended application logic and potentially triggering secondary flaws such as SQL injection or cross-site scripting. To mitigate this risk, developers must explicitly initialize all variables before use and strictly validate incoming data against a whitelist of acceptable formats. Utilizing PHP’s register_globals deprecation practices, implementing robust input filtering functions, and adhering to the principle of least privilege ensure that external inputs cannot unexpectedly overwrite internal state, thereby preserving application integrity and preventing unauthorized code execution or data manipulation.

MITRE CWE Description
A PHP application does not properly protect against the modification of variables from external sources, such as query parameters or cookies. This can expose the application to numerous weaknesses that would not exist otherwise.
Common Consequences (1)
IntegrityModify Application Data
Mitigations (1)
Requirements, ImplementationCarefully identify which variables can be controlled or influenced by an external user, and consider adopting a naming convention to emphasize when externally modifiable variables are being used. An application should be reluctant to trust variables that have been initialized outside of its trust boundary. Ensure adequate checking is performed when relying on input from outside a trust boundary. D…

Vulnerabilities classified as CWE-473 (PHP参数外部修改) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.