PHP 8.28.5 UAFREE in SoapServer before 8.2.31/8.3.31/8.4.21/8.5.6
CVE-2026-7261 Published on May 10, 2026

SoapServer session-persisted object use-after-free via SOAP header fault
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.

Vendor Advisory NVD

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2026-7261 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2026-7261

Want to know whenever a new CVE is published for PHP? stack.watch will email you.

PHP
 

Affected Versions

PHP Group PHP: