{"api_version":"1","generated_at":"2026-04-23T03:06:36+00:00","cve":"CVE-2022-31631","urls":{"html":"https://cve.report/CVE-2022-31631","api":"https://cve.report/api/cve/CVE-2022-31631.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31631","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31631"},"summary":{"title":"CVE-2022-31631","description":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","state":"RESERVED","assigner":"cve@mitre.org","published_at":null,"updated_at":"2022-05-25 22:10:45"},"problem_types":[],"metrics":[],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31631","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31631","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-31631","qid":"160478","title":"Oracle Enterprise Linux Security Update for php:8.0 (ELSA-2023-0848)"},{"cve":"CVE-2022-31631","qid":"160486","title":"Oracle Enterprise Linux Security Update for Hypertext Preprocessor (PHP) (ELSA-2023-0965)"},{"cve":"CVE-2022-31631","qid":"160592","title":"Oracle Enterprise Linux Security Update for 8.1 (ELSA-2023-2417)"},{"cve":"CVE-2022-31631","qid":"160672","title":"Oracle Enterprise Linux Security Update for php:7.4 (ELSA-2023-2903)"},{"cve":"CVE-2022-31631","qid":"181613","title":"Debian Security Update for php7.3 (DLA 3345-1)"},{"cve":"CVE-2022-31631","qid":"181663","title":"Debian Security Update for php7.4 (DSA 5363-1)"},{"cve":"CVE-2022-31631","qid":"182937","title":"Debian Security Update for php8.2 (CVE-2022-31631)"},{"cve":"CVE-2022-31631","qid":"199126","title":"Ubuntu Security Notification for Hypertext Preprocessor (PHP) Vulnerability (USN-5818-1)"},{"cve":"CVE-2022-31631","qid":"199545","title":"Ubuntu Security Notification for Hypertext Preprocessor (PHP) Vulnerabilities (USN-5905-1)"},{"cve":"CVE-2022-31631","qid":"241205","title":"Red Hat Update for php:8.0 (RHSA-2023:0848)"},{"cve":"CVE-2022-31631","qid":"241219","title":"Red Hat Update for Hypertext Preprocessor (PHP) (RHSA-2023:0965)"},{"cve":"CVE-2022-31631","qid":"241447","title":"Red Hat Update for php:8.1 (RHSA-2023:2417)"},{"cve":"CVE-2022-31631","qid":"241540","title":"Red Hat Update for php:7.4 (RHSA-2023:2903)"},{"cve":"CVE-2022-31631","qid":"283603","title":"Fedora Security Update for Hypertext Preprocessor (PHP) (FEDORA-2023-2dc2d607ba)"},{"cve":"CVE-2022-31631","qid":"283613","title":"Fedora Security Update for Hypertext Preprocessor (PHP) (FEDORA-2023-5732365005)"},{"cve":"CVE-2022-31631","qid":"355222","title":"Amazon Linux Security Advisory for php8.1 : ALAS2023-2023-081"},{"cve":"CVE-2022-31631","qid":"356063","title":"Amazon Linux Security Advisory for Hypertext Preprocessor (PHP) : ALASPHP8.0-2023-003"},{"cve":"CVE-2022-31631","qid":"356086","title":"Amazon Linux Security Advisory for Hypertext Preprocessor (PHP) : ALASPHP8.0-2023-003"},{"cve":"CVE-2022-31631","qid":"356088","title":"Amazon Linux Security Advisory for Hypertext Preprocessor (PHP) : ALASPHP8.1-2023-003"},{"cve":"CVE-2022-31631","qid":"356281","title":"Amazon Linux Security Advisory for Hypertext Preprocessor (PHP) : ALAS2PHP8.2-2023-003"},{"cve":"CVE-2022-31631","qid":"378747","title":"Alibaba Cloud Linux Security Update for php:7.4 (ALINUX3-SA-2023:0088)"},{"cve":"CVE-2022-31631","qid":"502622","title":"Alpine Linux Security Update for php8"},{"cve":"CVE-2022-31631","qid":"502623","title":"Alpine Linux Security Update for php81"},{"cve":"CVE-2022-31631","qid":"503214","title":"Alpine Linux Security Update for php82"},{"cve":"CVE-2022-31631","qid":"506154","title":"Alpine Linux Security Update for php82"},{"cve":"CVE-2022-31631","qid":"672862","title":"EulerOS Security Update for Hypertext Preprocessor (PHP) (EulerOS-SA-2023-1603)"},{"cve":"CVE-2022-31631","qid":"753501","title":"SUSE Enterprise Linux Security Update for php74 (SUSE-SU-2023:0072-1)"},{"cve":"CVE-2022-31631","qid":"753504","title":"SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2023:0084-1)"},{"cve":"CVE-2022-31631","qid":"753508","title":"SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2023:0073-1)"},{"cve":"CVE-2022-31631","qid":"753531","title":"SUSE Enterprise Linux Security Update for php8 (SUSE-SU-2023:0074-1)"},{"cve":"CVE-2022-31631","qid":"753778","title":"SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2023:0476-1)"},{"cve":"CVE-2022-31631","qid":"940930","title":"AlmaLinux Security Update for php:8.0 (ALSA-2023:0848)"},{"cve":"CVE-2022-31631","qid":"940947","title":"AlmaLinux Security Update for Hypertext Preprocessor (PHP) (ALSA-2023:0965)"},{"cve":"CVE-2022-31631","qid":"941025","title":"AlmaLinux Security Update for php:8.1 (ALSA-2023:2417)"},{"cve":"CVE-2022-31631","qid":"941091","title":"AlmaLinux Security Update for php:7.4 (ALSA-2023:2903)"},{"cve":"CVE-2022-31631","qid":"960657","title":"Rocky Linux Security Update for php:8.0 (RLSA-2023:0848)"},{"cve":"CVE-2022-31631","qid":"960904","title":"Rocky Linux Security Update for Hypertext Preprocessor (PHP) (RLSA-2023:0965)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-31631","ASSIGNER":"cve@mitre.org","STATE":"RESERVED"},"description":{"description_data":[{"lang":"eng","value":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."}]}},"nvd":{"publishedDate":null,"lastModifiedDate":null,"problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":null,"notes":[]}}}