Vulnerability Description
PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpunit Project | Phpunit | 12.5.21 |
Related Weaknesses (CWE)
References
- https://github.com/sebastianbergmann/phpunit/pull/6592Issue TrackingPatch
- https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-qrr6-mg7r-MitigationPatchVendor Advisory
- https://github.com/sebastianbergmann/phpunit/pull/6592Issue TrackingPatch
FAQ
What is CVE-2026-41570?
CVE-2026-41570 is a vulnerability with a CVSS score of 7.8 (HIGH). PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line argum...
How severe is CVE-2026-41570?
CVE-2026-41570 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41570?
Check the references section above for vendor advisories and patch information. Affected products include: Phpunit Project Phpunit.