by : ongraph
October 8th 2014

PHP (Hypertext Preprocessor) is a general-purpose scripting language widely used for web development. It was created by Rasmus Lerdorf in 1993 and released in 1995. A PHP server, also called a PHP application server, provides a platform where all PHP applications run. We are explaining here completely how to Secure File Upload in PHP correctly.

Uploading a file (such as an image, zip, or PDF) is quite common in website development, and PHP makes the process very simple with the move_uploaded_file method. But hackers are always looking for easy prey, such as .exe, PHP, and scripting files.

Secure File Upload in PHP

Although this does not guarantee that after this your code and server will be fully protected from hackers. but something is better than nothing.

Here are 12 Helpful Tips for Coding File Uploads

Here are 12 Helpful Tips for Coding File Uploads

 

Step 1:- Set File permission:

Before placing the file on the server, you may add non-executable permission to it. The server will be safe from executable and scripting files using this approach. You can use PHP’s chmod() function to change file permissions.

if(move_uploaded_file($_FILES[“uploadedfile”][“tmp_name”], $target_path)) {

         chmod($target_path, 0755);

     }else{

         echo “There was an error uploading the file, please try again!”;

     }

Step 2:- Use getimagesize method:

A very common trick used by hackers is changing the content type of a file to a valid one. To ensure that the uploaded file is a valid one or an image file, you can use the getimagesize() method.

$imageinfo = getimagesize($_FILES[“uploadfile”][“tmp_name”]);

     if($imageinfo[“mime”] != “image/gif” && $imageinfo[“mime”] != “image/jpeg” && isset($imageinfo))

     {

         // invalid file

     }

Step 3:- Create an upload folder outside of root:

The best way to prevent users from requesting uploaded files straight away is to keep the file in a folder outside the root. However, the major disadvantage of this method is that after this server will be unable to access the file.

Step 4:- Use .htaccess file:

You can set permission and prevent hackers from accessing files by making changes in the .htaccess file, If somehow hackers upload a file this will prevent executing a file.

Step 5:- The Include Function:

Sometimes you need to obtain input from the user in order to determine which file should be included in the PHP server script. For example, suppose your site is called Site_languageuage.

if(isset($_COOKIE[‘Site_language’])){      

     $Site_language = $_COOKIE[‘Site_language’];

} elseif (isset($_GET[‘Site_language’])) {

     $Site_language = $_GET[‘Site_language’];

} elseif (isset($_GET[‘Site_language’])) {

     $Site_language = $_GET[‘Site_language’];

} else {

     $Site_language = ‘English’;

}

$siteLanguagePath = “Language/”.$Site_language;

include($siteLanguagePath);

Now there is no security for the input of site_language, A hacker can take benefit of this and enter the path of the file that he wants to execute.

As a result, to guarantee that hackers do not upload any harmful files to the system, you must secure your input/upload feature.

Step 6:- Rename the file with an auto-generated name:

While uploading to the server, it is a good idea to change the file’s name. Hackers would find it difficult to figure out the name of the file and then hack or download it from the server.

It’s possible to encrypt and decrypt files using a variety of methods, including md5, for example. Alternatively, you might use self-encryption to encrypt and decrypt file names.

Step 7:- Restrict upload file size by HTML or PHP code:

You may secure your system by restricting or limiting the file size that can be uploaded. It will prevent users from uploading a huge file that would exceed the limit and cause problems for your system.

You can make these changes by using HTML as well as PHP script

Html:

<input type=’hidden’ name=’MAX_FILE_SIZE’ value=’100000′ />

PHP:

$max_file_size = 100000000;  

if(!$file_size || $file_size > $max_file_size) {

     echo “File size is more than maximum size limit”;

}

Step 8:- Verify session authentication:

After successful authentication, you may also check session authentication and enable file upload functionality.

or

You can also add a captcha to provide security against automated scripts. There are still several techniques available to us to safeguard your server from hackers and prevent them from uploading harmful material –

  • Check the mime type
  • Use an anti-virus
  • Took a combined protection
  • Use a different subdomain for uploading purposes

Each day new techniques are discovered to stop hackers from such work so keeping you updated is the best practice to keep your data secure.

9. Use an HTML Form with the POST Method

Use the POST method to Secure File Upload in PHP with HTML, so that the sensitive information will not be passed in the URL.

 

<form action=”upload.php” method=”post” enctype=”multipart/form-data”>

    <input type=”file” name=”uploaded_file”>

    <input type=”submit” value=”Upload”>

</form>

10. Use a Content Security Policy (CSP)

Set up a CSP to limit what types of content the browser can execute. Configure your CSP to block inline scripts and restrict resource loading to prevent cross-site scripting (XSS) attacks on uploaded files.

11. Enable PHP Settings for Additional Security

Make sure certain PHP settings are configured correctly:

  • Disable file_uploads if file uploads are not required.
  • Limit the fields- upload_max_filesize and post_max_size in your php.ini file to enforce file size restrictions.

 

file_uploads = On

upload_max_filesize = 2M

post_max_size = 8M

12. Log and Monitor Uploads

Make sure to log all uploads to monitor all activities and alert you to potential security issues.

Advanced Techniques To Secure File Uploads in PHP

Beyond the above traditional options, you can try the following advanced techniques to php secure file upload.

1. Use a Content Delivery Network (CDN) for Serving Files

  • Separate File Handling: Offload uploaded files to a secure Content Delivery Network (CDN) instead of serving them directly from your server. CDNs are optimized for static file delivery and often have built-in security features.
  • Prevents Server Overload: This limits direct access to your server resources, reducing the risk of attacks targeting your server’s storage and bandwidth.

2. Set Strict CORS Policies for File Access

  • Limit Access to Allowed Domains: Use Cross-Origin Resource Sharing (CORS) to restrict which domains can access uploaded files. This can prevent external websites from accessing sensitive files or data.
  • Example: You can configure CORS settings in your server to only allow your website’s domain to access the resources.

3. Use Database References Instead of File Paths

  • Store File Metadata, Not Paths: Instead of storing direct paths to files in the database, store metadata (such as an ID or reference key) that maps to files stored in a secure location.
  • Obscure Direct Paths: This abstraction layer prevents users from accessing files by guessing paths or modifying URLs.

4. Scan File Contents for Dangerous Code Patterns

  • Custom Regex or Libraries: Before saving the uploaded file, scan it for malicious code patterns. For example, look for PHP tags (<?php) or executable JavaScript within text files.
  • Sanitization Libraries: Some libraries or APIs specialize in file sanitization and can scrub dangerous patterns from files before storing them.

5. Implement Rate Limiting for File Uploads

  • Prevent Spam and Abuse: Implement rate limiting to restrict the number of files a user can upload within a specified time. This reduces the risk of spam or DoS (Denial of Service) attacks on your file upload endpoint.
  • Server-Side Throttling: Configure rate limits in your web server (e.g., Nginx or Apache) or application layer to block repetitive requests.

6. Sanitize Filenames Thoroughly

  • Remove Special Characters: Remove potentially dangerous characters like .., ;, /, \, and non-printable ASCII to prevent directory traversal attacks.
  • Whitelist Characters: Allow only alphanumeric characters and underscores in filenames to avoid unintended actions by the server.

7. Set Up Server-Level Malware Detection

  • Use Intrusion Detection Systems (IDS): Employ tools like OSSEC, Fail2Ban, or similar intrusion detection systems to monitor and alert you of unusual file or directory access patterns.
  • Scheduled Scans: Schedule regular scans for malicious files and malware signatures on uploaded files and the entire upload directory.

8. Use Temporary Storage Services (e.g., S3 or Azure Blob)

  • Isolate File Storage: Store files on external storage services like Amazon S3 or Azure Blob Storage, which come with advanced security settings and allow more flexible access control.
  • Direct Browser Uploads: In some setups, users can upload directly to the storage provider without routing through your server, improving performance and php secure image upload.

9. Two-factor Authentication for Sensitive File Uploads

  • For Restricted Uploads: For certain sensitive file types or admin-level uploads, require two-factor authentication (2FA) to ensure php file upload security.
  • User Confirmation: For critical applications, notify the user of file uploads with confirmation to prevent unauthorized uploads.

10. Implement File Quarantine Before Processing

  • Hold Files Temporarily: Instead of directly allowing access to uploaded files, quarantine them in a restricted area for a brief period.
  • Automated Scanning: Set up an automated process to scan quarantined files for malicious content before making them accessible.

Using these methods alongside traditional file upload security practices creates a secure file upload PHP. The key is a multi-layered approach combining server-level protections, application-level checks, and proactive monitoring.

Conclusion

In website development, uploading a file (such as an image, zip, or PDF) is quite common, and PHP makes the procedure straightforward with the move_uploaded_file method. However, hackers are always looking for easy prey such as .exe, PHP, and script files. We hope that this blog helped you in some manner. Keeping up with the latest methods to defend yourself from such jobs is essential to keep your data secure.

Need expert solutions for your online project? Get in touch with our team of specialists today!

FAQs

Q1. What are the basic security risks when allowing file uploads? 

If you Secure File Upload in PHP, it poses different risks, such as executing malicious scripts (like PHP) without any proper validation, overwriting critical files, or consuming excessive server resources.

Q2. How can I secure file uploads in PHP? 

Secure file uploads in PHP by:

  • Validating file types and sizes on the client and server side.
  • Storing uploaded files outside the web root directory.
  • Generating unique filenames to prevent overwriting and guessing.
  • Restricting file permissions and using .htaccess to block direct access.

Q3. Why is validating file types important? 

Validating file types ensures that you only upload the relevant file formats. It reduces the risk of executing malicious scripts disguised as innocent file types (e.g., PHP files posing as images).

Q4. Where should I store uploaded files on the server? 

Store uploaded files in a directory outside the web root. This prevents direct access through a URL and reduces the risk of executing uploaded scripts.

Q5. Do you offer PHP development services?

With 15+ years of experience, we offer the best and highest-quality PHP development services, including

  • Custom web application development
  • E-commerce solutions
  • API development and integration
  • Content management systems (CMS) development
  • PHP framework-based development (such as Laravel, Symfony, and CodeIgniter)
  • PHP maintenance and support

About the Author

ongraph

Let’s Create Something Great Together!




    Latest Blog

    How to Monetize a Dating App- Key Revenue Models and Strategies

    Read more
    Python vs Go: Which to Choose and When in 2025

    Python vs Go: Which to Choose and When in 2025?

    Read more
    Dating App Development Trends

    Top 10 Dating App Development Trends in 2025

    Read more