Use-After-Free in SOAP using Apache map with Remote Code Execution

Inhalt

ext-soap supports deduplicating objects in the XML graph through id and href. When traversing the XML graph, ext-soap will remember all plain PHP objects using the hash map SOAP_GLOBAL(ref_map), where the pointer to the libxml2 node acts as a key, and the PHP object as a value. This happens in soap_add_xml_ref().

https://github.com/php/php-src/blob/dcf653339c245e25ea319248d0fc071a9405d688/ext/soap/php_encoding.c#L349-L354

Crucially, the reference count of the PHP object is not increased. Normally this is not a problem, as all objects in the XML graph are stored in the resulting object graph and cannot be freed.

soap_check_xml_ref() does the opposite of soap_add_xml_ref(); it will check whether some libxml2 node as already been evaluated and stored in SOAP_GLOBAL(ref_map).

https://github.com/php/php-src/blob/dcf653339c245e25ea319248d0fc071a9405d688/ext/soap/php_encoding.c#L331-L347

The Apache map offers a mechanism to free objects between these two points by overwriting existing map entries.

class Handler {
    public function test($map, $stale) {
        global $result;
        $result = $stale;
    }
}

$envelope = <<<'XML' somekey Stale somekey XML;

$s = new SoapServer(null, ['uri' => 'urn:a']);
$s->setClass(Handler::class);
$s->handle($envelope);
var_dump($result);

This example will:

  • evaluate the map node
  • evaluate the Stale object, which includes calling calling soap_add_xml_ref() to remember it in SOAP_GLOBAL(ref_map)
  • add the resulting object to a temporary map, which will be the result of the Apache map node
  • overwrite the object immediately with NULL for the with an empty , releasing the Stale object only strongly referenced by the temporary map, with the reference in SOAP_GLOBAL(ref_map) becoming stale
  • have refer to this stale pointer within SOAP_GLOBAL(ref_map), reusing the freed memory

After this code, $result will refer to the stale memory where Stale was previously allocated. The attacker has high control over this memory segment by subsequently allocating plain strings, leading to Remote Code Execution.

The solution is straight forward, namely increase the reference count before adding objects to SOAP_GLOBAL(ref_map), and configure a ZVAL_PTR_DTOR deallocator to release the objects when the procedure is done.

Verknuepfte CVEs

CVE-ID Severity (CVE.org) CVSS (CVE.org) EPSS EPSS-% Veroeffentlicht (CVE.org)

CVE-2026-6722

- - - -

Quellen-Details

Bezeichnung Name Kategorie Tags Zielgruppe Sprache Feed-URL
PHP Security (php/php-src GHSA)

php_sec

vendor_advisory php, runtime - de https://github.com/php/php-src/security/advisories