Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Warns: MistralAI PyPI Package Injects Compromised Malicious
May 12, 2026
Claude Chrome Extension Flaw Steals Gmail & Drive Data
May 12, 2026
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Home/CyberSecurity News/Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
CyberSecurity News

Critical PHP SOAP Flaws Enable Remote Code Execution Attacks

A serious cluster of vulnerabilities has been uncovered in PHP’s core string processing and ext-soap components, putting numerous web servers at immediate risk of total takeover. While the SOAP...

Emy Elsamnoudy
Emy Elsamnoudy
May 12, 2026 2 Min Read
2 0

A serious cluster of vulnerabilities has been uncovered in PHP’s core string processing and ext-soap components, putting numerous web servers at immediate risk of total takeover.

While the SOAP extension has a notorious history of memory corruption flaws, this latest discovery crosses the red line into unauthenticated Remote Code Execution (RCE).

GitHub security teams are now locked in a race against time, as PHP maintainers deploy emergency patches to prevent attackers from turning vulnerable servers into compromised assets.

The most critical vulnerability, tracked as CVE-2026-6722, is a high-severity use-after-free flaw in the PHP SOAP extension.

This vulnerability emerges from how the extension handles deduplicating objects within the XML graph using id and href attributes.

Additional PHP SOAP Flaws

When parsing an XML document, the extension stores plain PHP objects in a global hash map but critically fails to increment their reference count.

By leveraging the Apache map mechanism, an attacker can intentionally free these objects by overwriting existing map entries.

This memory manipulation allows the attacker to reuse the freed memory segment, leading to dangerous memory corruption.

As demonstrated by security researcher Brett Gervasoni, an attacker can highly control this freed memory by subsequently allocating plain strings, ultimately escalating the flaw into full Remote Code Execution.

Alongside the RCE flaw, the PHP security team addressed four additional moderate-severity vulnerabilities through GitHub.

Developer iluuu1994 spearheaded remediation efforts for all the newly disclosed bugs.

CVE-2026-7261 involves another Use-After-Free issue in the SoapServer when handling session-persisted objects

 If a header node’s handler function fails or throws an exception, the object is incorrectly freed but still written to session storage.

CVE-2026-7262 is a NULL pointer dereference vulnerability triggered during the decoding of Apache: Map nodes.

By sending a specially crafted XML request missing the value node, attackers can consistently crash the PHP process, resulting in a Denial of Service.

CVE-2026-7258 exposes an out-of-bounds read in the native urldecode() function.

Due to a missing type cast when evaluating hexadecimal characters, negative byte values can cause a segmentation fault on some platforms, such as NetBSD.

CVE-2026-6104 affects the mbstring extension: parsing encoding names containing embedded NUL bytes causes a global buffer overrun.

This information disclosure bug can read beyond intended bounds but is not directly exploitable for code execution.

These vulnerabilities affect multiple actively supported PHP branches for the SOAP-related flaws and the urldecode() bug.

The affected releases include PHP versions before 8.2.31, 8.3.31, 8.4.21, and 8.5.6. The mbstring vulnerability strictly impacts versions before 8.4.21 and 8.5.6.

Administrators are strongly advised to update their PHP environments immediately.

Patches contributed on GitHub by iluuu1994, iliaal, and ndossche are now integrated into PHP versions 8.2.31, 8.3.31, 8.4.21, and 8.5.6.

Upgrading to these patched versions securely resolves the memory mishandling and out-of-bounds read issues, defending the server against both denial-of-service and remote-code-execution attacks.

Organizations using the SOAP extension must prioritize deploying this patch to protect critical infrastructure adequately.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Magecart Hackers Abuse GTM for Credit Card Sk Google Manager

Next Post

Claude Chrome Extension Flaw Steals Gmail & Drive Data

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android Zero-Click Vulnerability Enables Remote Shell Access
May 12, 2026
TrickMo Android Malware Targets Banking & Wallet Apps
May 12, 2026
OpenAI Daybreak Automates Detects and Fix Vulnerabilities
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us