CVE-2026-7568
EUVD-2026-2897210.05.2026, 05:16
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.Enginsight
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| php | php | 8.2.* ≤ 𝑥 < 8.2.31 | CNA |
| php | php | 8.3.* ≤ 𝑥 < 8.3.31 | CNA |
| php | php | 8.4.* ≤ 𝑥 < 8.4.21 | CNA |
| php | php | 8.5.* ≤ 𝑥 < 8.5.6 | CNA |
Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure