Home

Description

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-10 | Updated 2026-05-10 | Assigner php




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/RE:L/U:Amber

Problem types

CWE-190 Integer Overflow or Wraparound

CWE-125 Out-of-bounds Read

Product status

Default status
affected

8.2.* (semver) before 8.2.31
affected

8.3.* (semver) before 8.3.31
affected

8.4.* (semver) before 8.4.21
affected

8.5.* (semver) before 8.5.6
affected

Credits

Aleksey Solovev (Positive Technologies) finder

Tim Düsterhus remediation developer

References

github.com/...hp-src/security/advisories/GHSA-96wq-48vp-hh57

cve.org (CVE-2026-7568)

nvd.nist.gov (CVE-2026-7568)

Download JSON