Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4586-1 | php7.4 security update |
Debian DSA |
DSA-6255-1 | php8.2 security update |
Debian DSA |
DSA-6256-1 | php8.4 security update |
Tue, 12 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Php
Php php |
|
| CPEs | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Php
Php php |
|
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Php Group
Php Group php |
|
| Vendors & Products |
Php Group
Php Group php |
Sun, 10 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element. This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service. | |
| Title | NULL pointer dereference in SOAP apache:Map decoder with missing <value> | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: php
Published:
Updated: 2026-05-11T13:14:53.526Z
Reserved: 2026-04-28T05:09:37.127Z
Link: CVE-2026-7262
Updated: 2026-05-11T13:14:49.306Z
Status : Analyzed
Published: 2026-05-10T05:16:11.780
Modified: 2026-05-12T17:39:15.740
Link: CVE-2026-7262
No data.
OpenCVE Enrichment
Updated: 2026-05-10T06:00:06Z
Debian DLA
Debian DSA