SB2026051001 - Multiple vulnerabilities in PHP
Published: May 10, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 vulnerabilities.
1) Improper Encoding or Escaping of Output (CVE-ID: CVE-2026-7263)
The vulnerability allows a remote attacker to cause incorrect XML canonicalization output.
The vulnerability exists due to improper handling of namespace declarations in Dom\XMLDocument::C14N() when processing XML after setAttributeNS(). A remote attacker can supply crafted XML content to cause incorrect XML canonicalization output.
2) Cross-site scripting (CVE-ID: CVE-2026-6735)
The vulnerability allows a remote attacker to execute arbitrary script code in a user's browser.
The vulnerability exists due to cross-site scripting in the FPM status endpoint when handling requests. A remote attacker can send a specially crafted request to execute arbitrary script code in a user's browser.
3) NULL pointer dereference (CVE-ID: CVE-2026-7259)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to a null pointer dereference in php_mb_check_encoding() when mb_ereg_search_init() processes crafted input. A remote attacker can supply crafted input to cause a denial of service.
4) Out-of-bounds read (CVE-ID: CVE-2026-6104)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to an out-of-bounds read in mbfl_name2encoding_ex() when parsing crafted input. A remote attacker can supply crafted input to cause a denial of service.
5) SQL injection (CVE-ID: CVE-2025-14179)
The vulnerability allows a remote attacker to execute arbitrary SQL commands.
The vulnerability exists due to SQL injection in PDO_Firebird quoted string handling when processing NUL bytes in quoted strings. A remote attacker can supply crafted input containing NUL bytes to execute arbitrary SQL commands.
6) Use-after-free (CVE-ID: CVE-2026-6722)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to a stale pointer in SOAP_GLOBAL(ref_map) when processing SOAP requests with Apache Map. A remote attacker can send a specially crafted SOAP request to cause a denial of service.
Exploitation requires the Apache Map environment.
7) Use-after-free (CVE-ID: CVE-2026-7261)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to use-after-free in SOAP header parsing when a header parsing failure occurs with SOAP_PERSISTENCE_SESSION. A remote attacker can send a specially crafted SOAP request to cause a denial of service.
Exploitation requires SOAP_PERSISTENCE_SESSION.
8) NULL pointer dereference (CVE-ID: CVE-2026-7262)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper null pointer handling in Apache map value processing when handling SOAP requests. A remote attacker can send a specially crafted SOAP request to cause a denial of service.
Exploitation requires the Apache Map environment.
9) Integer overflow (CVE-ID: CVE-2026-7568)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to an integer overflow in char array offset handling when processing crafted input. A remote attacker can supply crafted input to cause a denial of service.
10) Type conversion (CVE-ID: CVE-2026-7258)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper type handling in ctype.h function calls when processing non-unsigned char values. A remote attacker can supply crafted input to cause a denial of service.
11) Integer overflow (CVE-ID: CVE-2026-42371)
The vulnerability allows a remote attacker to cause incorrect URI parsing results.
The vulnerability exists due to numeric truncation in text range comparison in uriparser when parsing crafted URI input. A remote attacker can supply crafted URI input to cause incorrect URI parsing results.
Remediation
Install update from vendor's website.