This event is generated when an attempt is made to exploit a known vulnerability in a PHP web application running on a server.
Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application.
Possible execution of arbitrary code of the attackers choosing in some cases.
An attacker can access an authentication mechanism and supply his/her own credentials to gain access.
Alternatively the attacker can exploit weaknesses to gain access as the administrator by supplying input of their choosing to the underlying PHP script.