CVE-2025-6491
NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix%' ORDER BY 1585-- ioVB
| Publication Date | 2025-07-05 |
|---|---|
| Severity | Moderate |
| Type | XML eXternal Entity injection |
| Affected PHP Versions |
|
| Fixed Product Versions |
|
CVE Details
In all PHP versions prior to 8.1, PHP versions 8.1.0-8.1.32, 8.2.0-8.2.28, 8.3.0-8.3.22, and 8.4.0-8.4.9, when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.
Recommendations
SOAP XML parsing generally happens within the SoapClient or SoapServer classes, which do not provide options for pre-validation of the XML. If you are consuming or providing a SOAP service, we recommend either using a 3rd party library such as phpro/soap-client to mitigate this issue, or updating to a version of PHP that patches this vulnerability.