CVE-2026-41570

NameCVE-2026-41570
DescriptionPHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
phpunit (PTS)bullseye9.5.2-1vulnerable
bullseye (security)9.5.2-1+deb11u1vulnerable
bookworm9.6.7-1vulnerable
trixie11.5.19-1+deb13u1vulnerable
forky, sid13.0.6-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
phpunitsource(unstable)(unfixed)

Notes

https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-qrr6-mg7r-m243
https://github.com/sebastianbergmann/phpunit/pull/6592

Search for package or bug name: Reporting problems