Description
A Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of untrusted input. Maliciously structured messages—specifically those containing negative varints or deep recursion—can be used to crash the application, impacting service availability.
Published: 2026-04-16
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (remote application crash)
Action: Update Library
AI Analysis

Impact

The flaw lies in the Protobuf PHP library’s parsing routine for untrusted data. Messages that embed negative varints or trigger deep recursion force the parser logic to misbehave, causing a crash of the application or service that processes the data. Because the crash is unconditional, the attacker can repeatedly induce downtime by sending these crafted messages. This weakness is an input validation flaw, and it enables an attacker to compromise system availability for any application that relies on that library.

Affected Systems

Any PHP application that depends on the Protobuf PHP package distributed via PECL is potentially impacted. Versions of the library released before the publicly documented fix are considered vulnerable. The vulnerability does not target the PHP language itself, but the library that imports and decodes external protobuf messages.

Risk and Exploitability

The assigned CVSS score of 7.1 calls out a high severity level for availability impact. No proven exploits have appeared in public advisories, and the vulnerability is not in the current known exploited vulnerability list, indicating limited evidence of widespread exploitation. An attacker can exploit the weakness by sending a maliciously constructed protobuf payload to any exposed endpoint or service that invokes the parser, leading to an application crash and forcing a restart or downtime.

Generated by OpenCVE AI on April 17, 2026 at 03:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest release of the Protobuf PHP library that contains the patch for this denial‑of‑service flaw
  • Verify and restrict protobuf input before it reaches the parser—enforce size limits, detect negative varints, and reject messages that could cause deep recursion
  • Limit access to services that use the library so that only trusted or authenticated clients can send protobuf requests

Generated by OpenCVE AI on April 17, 2026 at 03:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p2gh-cfq4-4wjc Protobuf: Denial of Service issue through malicious messages containing negative varints or deep recursion
History

Thu, 16 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Protocol Buffers
Protocol Buffers protobuf-php
Vendors & Products Protocol Buffers
Protocol Buffers protobuf-php

Thu, 16 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of untrusted input. Maliciously structured messages—specifically those containing negative varints or deep recursion—can be used to crash the application, impacting service availability.
Title Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of untrusted input
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Protocol Buffers Protobuf-php
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2026-04-16T15:24:43.164Z

Reserved: 2026-04-15T21:56:37.963Z

Link: CVE-2026-6409

cve-icon Vulnrichment

Updated: 2026-04-16T15:24:31.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-16T15:17:41.910

Modified: 2026-04-17T15:17:00.957

Link: CVE-2026-6409

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T03:30:08Z

Weaknesses