Browse all 8 CVE security advisories affecting guzzle. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Guzzle is a PHP HTTP client library primarily used for making HTTP requests and handling web service interactions. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting (XSS) flaws, and privilege escalation issues, often stemming from improper input validation and insecure default configurations. The library's widespread adoption in PHP ecosystems has made it a frequent target for attackers. Notable security characteristics include its complex middleware pipeline, which can introduce vulnerabilities if not properly configured, and several high-severity CVEs have been disclosed over the years, highlighting the importance of keeping Guzzle implementations updated and properly secured.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-31090 | CURLOPT_HTTPAUTH option not cleared on change of origin in Guzzle — guzzleCWE-200 | 7.7 | High | 2022-06-27 |
| CVE-2022-31091 | Change in port should be considered a change in origin in Guzzle — guzzleCWE-200 | 7.7 | High | 2022-06-27 |
| CVE-2022-31042 | Failure to strip the Cookie header on change in host or HTTP downgrade in Guzzle — guzzleCWE-200 | 7.5 | High | 2022-06-09 |
| CVE-2022-31043 | Fix failure to strip Authorization header on HTTP downgrade in Guzzle — guzzleCWE-200 | 7.5 | High | 2022-06-09 |
| CVE-2022-29248 | Cross-domain cookie leakage in Guzzle — guzzleCWE-200 | 8.0 | High | 2022-05-25 |
This page lists every published CVE security advisory associated with guzzle. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.