Skip to main content
Skip table of contents

PHP

This article covers PHP support and vulnerability detection for Mend SAST.

Mend SAST-supported PHP file types

**Note: These extensions are marked as ‘Secondary’ file extensions.
They will only be scanned if at least one file with any of the other ‘Primary’ file extensions is present to identify the language as the relevant language.

File Type

.php

.php2**

.php3**

.php4**

.php5**

.php6**

.phtm**

Mend SAST-supported PHP frameworks

Framework

Cake PHP

CodeIgniter

Kohana

Laravel

Phalcon

Symfony

Yii

Zend

Mend SAST-supported PHP vulnerability types

The PHP vulnerability types detected by SAST are provided below, organized by CWE ID within each of their identified severities.

PHP high-severity vulnerability types

CWE

Vulnerability Type

CWE-22

Path/Directory Traversal

CWE-73

File Manipulation

CWE-78

Command Injection

CWE-78

FTP Command Injection

CWE-79

Cross-Site Scripting

CWE-89

SQL Injection

CWE-94

Code Injection

CWE-98

PHP File Inclusion

CWE-384

Session Fixation

CWE-502

Deserialization of Untrusted Data

CWE-643

XPath Injection

CWE-918

Server-Side Request Forgery

PHP medium-severity vulnerability types

CWE

Vulnerability Type

CWE-90

LDAP Injection

CWE-209

Error Messages Information Exposure

CWE-209

Log Messages Information Leak

CWE-338

Weak Pseudo-Random

CWE-400

Regex Denial of Service (ReDoS)

CWE-472

Hidden HTML Input

CWE-611

XML External Entity (XXE) Injection

CWE-676

Miscellaneous Dangerous Functions

CWE-798

Hardcoded Password/Credentials

PHP low-severity vulnerability types

CWE

Vulnerability Type

CWE-20

Mail Relay

CWE-20

Cookie Injection

CWE-113

HTTP Header Injection

CWE-113

HTTP Response Splitting

CWE-326

Weak Encryption Strength

CWE-434

File Upload

CWE-530

Dangerous File Extensions

CWE-601

Unvalidated/Open Redirect

CWE-941

Arbitrary Server Connection

CWE-1004

Cookie Without 'HttpOnly' Flag

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.