Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-7261— SoapServer session-persisted object use-after-free via SOAP header fault

EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-7261

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SoapServer session-persisted object use-after-free via SOAP header fault
Source: NVD (National Vulnerability Database)
Vulnerability Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHP 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHP是PHP开源的一种在服务器端执行的脚本语言。 PHP 8.2.31之前版本、8.3.31之前版本、8.4.21之前版本和8.5.6之前版本存在资源管理错误漏洞,该漏洞源于当SoapServer配置为SOAP_PERSISTENCE_SESSION时,处理程序对象通过会话存储跨请求持久化,但在SOAP请求出错时持久化处理不当导致释放对象而保留指针,可能引发释放后重用,导致内存损坏、信息泄露或进程崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PHP GroupPHP 8.2.* ~ 8.2.31 -

II. Public POCs for CVE-2026-7261

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-7261

登录查看更多情报信息。

Same Patch Batch · PHP Group · 2026-05-10 · 10 CVEs total

CVE-2026-7258Out-of-bounds read in urldecode() on NetBSD
CVE-2026-7262NULL pointer dereference in SOAP apache:Map decoder with missing <value>
CVE-2026-7259Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init()
CVE-2026-7568Signed integer overflow in metaphone()
CVE-2026-6722Use-After-Free in SOAP using Apache map
CVE-2026-6735XSS within PHP-FPM status endpoint
CVE-2025-14179SQL injection in pdo_firebird via NUL bytes in quoted strings
CVE-2026-7263DoS attack via DOMNode::C14N()
CVE-2026-6104Global buffer over-read in mb_convert_encoding() with attacker-supplied encoding

IV. Related Vulnerabilities

V. Comments for CVE-2026-7261

No comments yet


Leave a comment