Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-6722— Use-After-Free in SOAP using Apache map

EPSS 0.29% · P53
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-6722

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Use-After-Free in SOAP using Apache map
Source: NVD (National Vulnerability Database)
Vulnerability Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PHP GroupPHP 8.2.* ~ 8.2.31 -

II. Public POCs for CVE-2026-6722

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-6722

登录查看更多情报信息。

Same Patch Batch · PHP Group · 2026-05-10 · 10 CVEs total

CVE-2026-7258Out-of-bounds read in urldecode() on NetBSD
CVE-2026-7262NULL pointer dereference in SOAP apache:Map decoder with missing <value>
CVE-2026-7261SoapServer session-persisted object use-after-free via SOAP header fault
CVE-2026-7259Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init()
CVE-2026-7568Signed integer overflow in metaphone()
CVE-2026-6735XSS within PHP-FPM status endpoint
CVE-2025-14179SQL injection in pdo_firebird via NUL bytes in quoted strings
CVE-2026-7263DoS attack via DOMNode::C14N()
CVE-2026-6104Global buffer over-read in mb_convert_encoding() with attacker-supplied encoding

IV. Related Vulnerabilities

V. Comments for CVE-2026-6722

No comments yet


Leave a comment