{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7261","assignerOrgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","state":"PUBLISHED","assignerShortName":"php","dateReserved":"2026-04-28T05:08:46.198Z","datePublished":"2026-05-10T04:07:25.484Z","dateUpdated":"2026-05-11T13:14:26.451Z"},"containers":{"cna":{"providerMetadata":{"orgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","shortName":"php","dateUpdated":"2026-05-10T04:07:25.484Z"},"title":"SoapServer session-persisted object use-after-free via SOAP header fault","datePublic":"2026-05-07T00:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-416","description":"CWE-416 Use after free","type":"CWE"}]}],"affected":[{"vendor":"PHP Group","product":"PHP","packageName":"soap","versions":[{"status":"affected","version":"8.2.*","lessThan":"8.2.31","versionType":"semver"},{"status":"affected","version":"8.3.*","lessThan":"8.3.31","versionType":"semver"},{"status":"affected","version":"8.4.*","lessThan":"8.4.21","versionType":"semver"},{"status":"affected","version":"8.5.*","lessThan":"8.5.6","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.","supportingMedia":[{"type":"text/html","base64":false,"value":"In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when <code>SoapServer</code> is configured with <code>SOAP_PERSISTENCE_SESSION</code>, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system."}]}],"references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-m33r-qmcv-p97q","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","Safety":"PRESENT","Automatable":"YES","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","version":"4.0","baseSeverity":"MEDIUM","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/S:P/AU:Y/RE:M/U:Amber"}}],"credits":[{"lang":"en","value":"Ilia Alshanetsky","type":"reporter"},{"lang":"en","value":"Ilija Tovilo","type":"remediation developer"}],"source":{"advisory":"GHSA-m33r-qmcv-p97q","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-11T13:14:14.879341Z","id":"CVE-2026-7261","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-11T13:14:26.451Z"}}]}}