CVE-2026-7568 PUBLISHED

Signed integer overflow in metaphone()

Assigner: php
Reserved: 30.04.2026 Published: 10.05.2026 Updated: 10.05.2026

In PHP versions 8.2. before 8.2.31, 8.3. before 8.3.31, 8.4. before 8.4.21, and 8.5. before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/RE:L/U:Amber
CVSS Score: 6.3

Product Status

Vendor PHP Group
Product PHP
Versions Default: affected
  • affected from 8.2.* to 8.2.31 (excl.)
  • affected from 8.3.* to 8.3.31 (excl.)
  • affected from 8.4.* to 8.4.21 (excl.)
  • affected from 8.5.* to 8.5.6 (excl.)

Credits

  • Aleksey Solovev (Positive Technologies) finder
  • Tim Düsterhus remediation developer

References

Problem Types

  • CWE-190 Integer Overflow or Wraparound CWE
  • CWE-125 Out-of-bounds Read CWE

Impacts

  • CAPEC-92 Forced Integer Overflow