<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2421</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-22</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-22</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-22</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-22</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">php security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.

Security Fix(es):

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements.(CVE-2025-14179)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target&apos;s machine when the target is viewing the PHP-FPM status page.(CVE-2026-6735)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.(CVE-2026-7258)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.(CVE-2026-7261)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">php</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2421</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-14179</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6735</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7258</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7261</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-14179</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6735</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7258</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7261</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="php-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-bcmath-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-cli-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-common-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dba-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dbg-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debuginfo-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debugsource-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-devel-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-embedded-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-enchant-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ffi-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-fpm-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gd-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gmp-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-intl-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ldap-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mbstring-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mysqlnd-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-odbc-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-opcache-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pdo-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pgsql-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-process-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-snmp-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-soap-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-sodium-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-tidy-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-xml-8.0.30-13.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="php-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-13.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="php-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-bcmath-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-cli-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-common-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dba-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dbg-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debuginfo-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debugsource-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-devel-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-embedded-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-enchant-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ffi-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-fpm-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gd-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gmp-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-intl-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ldap-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mbstring-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mysqlnd-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-odbc-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-opcache-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pdo-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pgsql-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-process-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-snmp-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-soap-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-sodium-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-tidy-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-xml-8.0.30-13.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="php-help-8.0.30-13" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-help-8.0.30-13.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2025-14179</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2421</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target&apos;s machine when the target is viewing the PHP-FPM status page.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6735</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2421</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-7258</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2421</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-7261</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2421</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>