Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Amazon Bug Exposed AI Chat Agents Via Custom Permissions
May 14, 2026
Home/CyberSecurity News/PHP Composer Flaw Lets Attackers Execute Arbit Vulnerability Arbitrary
CyberSecurity News

PHP Composer Flaw Lets Attackers Execute Arbit Vulnerability Arbitrary

PHP Composer has released urgent security updates to patch two critical command injection vulnerabilities. As an essential dependency management tool relied upon by developers worldwide, any code...

Emy Elsamnoudy
Emy Elsamnoudy
April 15, 2026 2 Min Read
9 0

PHP Composer has released urgent security updates to patch two critical command injection vulnerabilities. As an essential dependency management tool relied upon by developers worldwide, any code execution flaws within Composer are highly concerning.

These specific bugs reside in the Perforce Version Control System (VCS) driver and allow attackers to execute arbitrary commands on a victim’s machine.

Users are strongly urged to immediately update their installations to Composer version 2.9.6 or the long-term support version 2.2.27.

According to the official security advisory published by Nils Adermann, the vulnerabilities stem from insufficient escaping of values when constructing shell commands.

Fortunately, the development team reports that there is currently no evidence of active exploitation in the wild prior to this public disclosure.

PHP Composer Vulnerability

The two security issues expose software developers to severe risks when handling untrusted projects or malicious package metadata.

  • CVE-2026-40176: Discovered by security researcher saku0512, this vulnerability directly affects the internal method used to generate Perforce commands.

    Attackers can seamlessly inject arbitrary commands by manipulating connection parameters such as the port, user, or client within a malicious composer.json file.

    This attack vector only works if a developer manually executes Composer commands on an untrusted project directory. It cannot be triggered silently through standard installed dependencies.

  • CVE-2026-40261: Reported by researcher Koda Reef, this flaw involves improper escaping when appending a source reference parameter to a system shell command.

    A compromised or malicious Composer repository can easily serve tainted package metadata that exploits this vulnerability.

    Alarmingly, an attacker does not even need Perforce software installed on the target machine, as Composer will attempt to run the injected command anyway.
     
    This is highly dangerous because it can be exploited simply by installing malicious dependencies from the source.

To protect the broader PHP developer ecosystem, security teams proactively scanned the primary public repository, Packagist.org, as well as Private Packagist environments.

These comprehensive scans revealed no existing packages attempting to exploit these specific vulnerabilities. As a strict preventative measure, the publication of Perforce source metadata has been completely disabled on both platforms since April 10, 2026.

Mitigations

The absolute most effective way to secure your local environment is to patch the software immediately. You can effortlessly upgrade to the safe releases by running the command composer.phar self-update in your terminal.

If you cannot update right away, security experts recommend the following temporary workarounds:

  • Avoid installing dependencies directly from source by utilizing the --prefer-dist flag or configuring your project settings to prefer distribution files.
  • Always ensure you are only relying on trusted, verified Composer package repositories.
  • Carefully inspect the composer.json files of any untrusted projects before executing Composer commands, verifying that all Perforce-related fields contain valid data.

Developers using self-hosted Private Packagist solutions should expect a prompt release update containing verification tools to scan for malicious metadata on their own infrastructure

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Windows Active Directory Vulnerability Allows Malicious Code

Next Post

Hackers Use AI Content on Google Discover for Malicious Push

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
OpenAI Sued for Sharing ChatGPT Data with Google, Class-Action Privacy
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us