Browse all 8 CVE security advisories affecting guzzle. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Guzzle is a PHP HTTP client library primarily used for making HTTP requests and handling web service interactions. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting (XSS) flaws, and privilege escalation issues, often stemming from improper input validation and insecure default configurations. The library's widespread adoption in PHP ecosystems has made it a frequent target for attackers. Notable security characteristics include its complex middleware pipeline, which can introduce vulnerabilities if not properly configured, and several high-severity CVEs have been disclosed over the years, highlighting the importance of keeping Guzzle implementations updated and properly secured.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-29197 | Improper header name validation in guzzlehttp/psr7 — psr7CWE-436 | 5.3 | Medium | 2023-04-17 |
| CVE-2022-24775 | Improper Input Validation in guzzlehttp/psr7 — psr7CWE-20 | 7.5 | High | 2022-03-21 |
This page lists every published CVE security advisory associated with guzzle. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.