Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.
Published: 2026-05-10
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

PHP functions such as urldecode pass signed characters to ctype routines like isxdigit, which on platforms with default signed char and optimized table‑lookup ctype implementations trigger a negative array offset. This out‑of‑bounds read can cause the PHP interpreter to crash, leading to a denial of service. The weakness is a classic example of CWE‑125, an out‑of‑bounds read that compromises availability. The issue is limited to malformed URL input processed by PHP and does not grant an attacker arbitrary code execution.

Affected Systems

The vulnerability exists in PHP releases 8.2.* through 8.2.30, 8.3.* through 8.3.30, 8.4.* through 8.4.20, and 8.5.* through 8.5.5. Systems running NetBSD, which uses a signed char default alongside optimized ctype table lookups, are particularly susceptible. Any deployment of PHP in these versions on compatible operating systems is at risk.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity. While the EPSS score is not available, the lack of listing in the CISA KEV catalog suggests limited public exploitation to date. The vulnerability requires an attacker to deliver invalid URL data that is processed by the PHP interpreter; this can be achieved remotely if PHP is exposed to untrusted input, such as web applications, or locally if privileged code can invoke the function. The exploit path is straightforward once the vulnerable PHP version is in use, and the impact is a forced crash of the interpreter. Addressing the flaw through an upgrade or configuration change mitigates the risk effectively.

Generated by OpenCVE AI on May 10, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PHP to version 8.2.31, 8.3.31, 8.4.21, 8.5.6 or later, where the signed‑char misuse has been fixed
  • On NetBSD or other systems with the default signed‑char ctype table lookups, recompile PHP with the unsigned‑char flag or disable optimized ctype lookup to prevent negative array offsets
  • Modify application logic to validate or sanitize URL‑decoded input and avoid calling urldecode on untrusted data until a patch is applied

Generated by OpenCVE AI on May 10, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6255-1 php8.2 security update
Debian DSA Debian DSA DSA-6256-1 php8.4 security update
History

Sun, 10 May 2026 05:45:00 +0000

Type Values Removed Values Added
First Time appeared Php Group
Php Group php
Vendors & Products Php Group
Php Group php

Sun, 10 May 2026 04:45:00 +0000

Type Values Removed Values Added
Description In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.
Title Out-of-bounds read in urldecode() on NetBSD
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published:

Updated: 2026-05-10T04:45:03.566Z

Reserved: 2026-04-28T04:58:17.457Z

Link: CVE-2026-7258

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T05:16:11.360

Modified: 2026-05-10T05:16:11.360

Link: CVE-2026-7258

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T05:30:05Z

Weaknesses