Table of Contents
About the 2025 PHP Survey and Report
In 2024, Nearly 55% of PHP Survey Participants Were Using EOL Versions
2024 Brought Changes to the PHP Community Support Lifecycle
Final Thoughts
Home Backend Development PHP Tutorial Announcing the 2025 PHP Landscape Survey

Announcing the 2025 PHP Landscape Survey

Jan 24, 2025 pm 01:58 PM

About the 2025 PHP Survey and Report

As a leading name in PHP, Zend is dedicated to supporting the overall PHP community. One way that we do so is through our annual PHP Landscape Survey and subsequent PHP Landscape Report. Each year, we gather responses from PHP teams around the world, and we use that information to forecast upcoming trends and patterns.

"Security is always a top concern for teams and organizations deploying PHP applications, and 2024 was no exception," says Matthew Weier O'Phinney, Senior Product Manager at Zend by Perforce. "In our 2025 iteration of the survey, alongside tracking the most used PHP tools and technologies, we will work to clarify the ways that teams are addressing those security concerns in 2025 – whether that’s through migration to supported PHP versions, taking advantage of long term support services, or outsourcing PHP monitoring and management.”

In 2024, Nearly 55% of PHP Survey Participants Were Using EOL Versions

PHP sets an aggressive release cycle, and as a result, many teams struggle to keep pace. Our 2024 PHP questionnaire found that approximately 55% of respondents were using end of life (EOL) PHP versions to run their applications. As EOL PHP no longer receives community support or security patches, it stands to reason that approximately 40% of participants ranked security as their team’s top priority, second only to developing new features.

A graph displaying the top priorities for PHP development teams in 2024
Source: 2024 PHP Landscape Report


Despite Using EOL PHP Versions, Users Remained Confident in Their Security

Despite the high number of participants currently using EOL PHP and ranking security as top of mind, our 2024 report found that nearly half of surveyed PHP teams, regardless of version, felt “Very Confident” in the overall security of their applications.

A chart displaying confidence in PHP security segmented by PHP version
Source: 2024 PHP Landscape Report


“User confidence in their application’s security, despite using unsupported PHP versions, speaks to the ongoing improvements in the language,” Weier O’Phinney states. “We are interested in continuing to track these improvements and other emerging patterns as we move into 2025."

2024 Brought Changes to the PHP Community Support Lifecycle

One large change for the 2025 PHP ecosystem is the recent extension of the community support lifecycle, with PHP versions now receiving an additional year of security support from the community.

"In general, we expect to see changes in habits surrounding migrations or upgrades as a result of this shift,” Weier O’Phinney explains. “The 2025 survey gives us the opportunity to track the impact that the expanded support timeline will have on the ecosystem, while also examining the usage of containerization and orchestration technologies, utilization of LTS or other support services, deployment trends, and more. With this data, we seek to create an accurate and comprehensive picture of the ever-evolving PHP landscape.”

Final Thoughts

The only constant in the PHP ecosystem is change, and keeping up with the evolving trends and innovations is a major challenge for PHP teams across the globe. Relevant and timely data allows teams like yours to make informed decisions that drive the success of your PHP applications and overall business.

That's where the 2025 PHP Landscape Survey and 2025 PHP Landscape Report come in. Help us build a full picture of the current ecosystem, and we'll help you make informed plans about your mission-critical PHP applications in the coming year.


The above is the detailed content of Announcing the 2025 PHP Landscape Survey. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Explain the concept of late static binding in PHP. Explain the concept of late static binding in PHP. Mar 21, 2025 pm 01:33 PM

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

Customizing/Extending Frameworks: How to add custom functionality. Customizing/Extending Frameworks: How to add custom functionality. Mar 28, 2025 pm 05:12 PM

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

How to send a POST request containing JSON data using PHP's cURL library? How to send a POST request containing JSON data using PHP's cURL library? Apr 01, 2025 pm 03:12 PM

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

See all articles