PatchSiren cyber security CVE debrief
CVE-2016-6175 PHP Gettext Project CVE debrief
CVE-2016-6175 is a critical remote code execution issue in php-gettext 1.0.12 and earlier. The flaw is an eval injection condition tied to a crafted plural forms header, which can allow arbitrary PHP code execution with no user interaction. NVD rates the issue CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps it to CWE-94.
- Vendor
- PHP Gettext Project
- Product
- CVE-2016-6175
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-07
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-07
- Advisory updated
- 2026-05-13
Who should care
Teams running php-gettext 1.0.12 or earlier, and maintainers of applications that bundle or vendor that library. Web application owners should treat this as urgent because successful exploitation can fully compromise the PHP process and the host application.
Technical summary
The vulnerable component is php-gettext, with NVD listing affected versions up to and including 1.0.12. The weakness is classified as CWE-94 (code injection) and is described as an eval injection issue triggered by a crafted plural forms header. Based on the supplied NVD data, the impact is remote, requires no privileges or user interaction, and can result in full confidentiality, integrity, and availability compromise.
Defensive priority
Critical priority. The combination of network exposure, no authentication, no user interaction, and remote code execution warrants immediate remediation.
Recommended defensive actions
- Inventory all applications, libraries, and containers that include php-gettext.
- Upgrade php-gettext to a version newer than 1.0.12 as soon as possible.
- If immediate upgrading is not possible, isolate affected systems and reduce exposure of any code paths that process untrusted translation files or headers.
- Rebuild and redeploy any packaged applications that vendor the vulnerable library so the fix is actually present in production.
- Verify remediation by checking the deployed php-gettext version and confirming the affected code path is no longer present.
Evidence notes
Supplied NVD data identifies php-gettext_project versions through 1.0.12 as vulnerable, assigns CVSS 3.0 9.8, and maps the issue to CWE-94. The description states that a crafted plural forms header can lead to arbitrary PHP code execution. NVD also lists related references to a Launchpad bug, a GitHub commit, a blog advisory, and an Exploit-DB entry.
Official resources
CVE published on 2017-02-07 and last modified by NVD on 2026-05-13. The supplied record does not include a KEV listing.