๐Ÿ” CVE Alert

CVE-2026-41570

HIGH 7.8

PHPUnit: Argument injection via newline in PHP INI values forwarded to child processes

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.

CWE CWE-93 CWE-88
Vendor sebastianbergmann
Product phpunit
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for sebastianbergmann phpunit

Be the first to know when new high vulnerabilities affecting sebastianbergmann phpunit are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

sebastianbergmann / phpunit
= 12.5.21 = 13.1.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-qrr6-mg7r-m243 github.com: https://github.com/sebastianbergmann/phpunit/pull/6592