<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>pixelfed &amp;mdash; pixelfed</title>
    <link>https://pixelfed.writeas.com/tag:pixelfed</link>
    <description>Official blog of Pixelfed</description>
    <pubDate>Sat, 16 May 2026 23:14:30 +0000</pubDate>
    <item>
      <title>Urgent security issue in NGINX/php-fpm</title>
      <link>https://pixelfed.writeas.com/urgent-security-issue-in-nginx-php-fpm-mcywf7xu?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[  TL;DR Update PHP to 7.3.11+ ASAP, a recent CVE has demonstrated RCE in certain nginx/php-fpm configurations&#xA;&#xA;br&#xA;&#xA;We have become aware of a new security risk that has emerged within the past few days. This exploit is bad, allowing remote code execution on certain nginx/php-fpm configurations. If you don’t run NGINX, this does not affect you.&#xA;&#xA;We recommend updating to PHP v 7.3.11 or later as soon as possible. If you used our example nginx configuration, please update the following code from:&#xA;&#xA;    location ~ \.php$ {&#xA;        fastcgisplitpathinfo ^(.+\.php)(/.+)$;&#xA;        fastcgipass unix:/run/php-fpm/php-fpm.sock;&#xA;        fastcgiindex index.php;&#xA;        include fastcgiparams;&#xA;        fastcgiparam SCRIPTFILENAME $documentroot$fastcgiscriptname;&#xA;    }&#xA;&#xA;to:&#xA;&#xA;    location ~ \.php$ {&#xA;        fastcgisplitpathinfo ^(.+\.php)(/.+)$;&#xA;        tryfiles $fastcgiscriptname =404;&#xA;        fastcgipass unix:/run/php-fpm/php-fpm.sock;&#xA;        fastcgiindex index.php;&#xA;        include fastcgiparams;&#xA;        fastcgiparam SCRIPTFILENAME $documentroot$fastcgiscript_name;&#xA;    }&#xA;&#xA;If you have any questions, join our #pixelfed channel on Freenode!&#xA;&#xA;-- Pixelfed Team]]&gt;</description>
      <content:encoded><![CDATA[<blockquote><p><em>TL;DR Update PHP to 7.3.11+ ASAP, a recent CVE has demonstrated RCE in certain nginx/php-fpm configurations</em></p></blockquote>

<p><br></p>

<p>We have become aware of a new security risk that has emerged within the past few days. This exploit is bad, allowing remote code execution on certain nginx/php-fpm configurations. If you don’t run NGINX, this does not affect you.</p>

<p>We recommend updating to PHP v 7.3.11 or later as soon as possible. If you used our <a href="https://docs.pixelfed.org/installing-pixelfed/postinstall.html#nginx" rel="nofollow">example nginx configuration</a>, please update the following code from:</p>

<pre><code>    location ~ \.php$ {
        fastcgi_split_path_info ^(.+\.php)(/.+)$;
        fastcgi_pass unix:/run/php-fpm/php-fpm.sock;
        fastcgi_index index.php;
        include fastcgi_params;
        fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
    }
</code></pre>

<p>to:</p>

<pre><code>    location ~ \.php$ {
        fastcgi_split_path_info ^(.+\.php)(/.+)$;
        try_files $fastcgi_script_name =404;
        fastcgi_pass unix:/run/php-fpm/php-fpm.sock;
        fastcgi_index index.php;
        include fastcgi_params;
        fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
    }
</code></pre>

<p>If you have any questions, join our <a href="https://pixelfed.writeas.com/tag:pixelfed" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">pixelfed</span></a> channel on Freenode!</p>

<p>— Pixelfed Team</p>
]]></content:encoded>
      <guid>https://pixelfed.writeas.com/urgent-security-issue-in-nginx-php-fpm-mcywf7xu</guid>
      <pubDate>Sat, 26 Oct 2019 01:00:12 +0000</pubDate>
    </item>
  </channel>
</rss>