Impact
A use‑after‑free flaw occurs in PHP’s SoapServer when the SOAP_PERSISTENCE_SESSION option is enabled and a SOAP request ends in an error. The server frees the handler object while retaining a pointer to it, which can cause memory corruption, data leakage, or application crashes.
Affected Systems
The vulnerability affects PHP Group PHP versions 8.2 before 8.2.31, 8.3 before 8.3.31, 8.4 before 8.4.21, and 8.5 before 8.5.6 when SoapServer is configured to persist the handler object across requests via session storage.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity, and the EPSS score is not available. The issue is not yet listed in CISA’s KEV catalog. A remote attacker can exploit the flaw by sending crafted SOAP requests that trigger a fault while SOAP_PERSISTENCE_SESSION is active. Successful exploitation may lead to memory corruption, information disclosure, or denial of service depending on the environment and error conditions.
OpenCVE Enrichment
Debian DSA