High severity7.5NVD Advisory· Published Sep 12, 2016· Updated May 6, 2026
CVE-2016-7125
CVE-2016-7125
Description
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9cenvdIssue TrackingPatch
- bugs.php.net/bug.phpnvdExploitIssue Tracking
- openwall.com/lists/oss-security/2016/09/02/9nvdMailing List
- www.php.net/ChangeLog-5.phpnvdRelease Notes
- www.php.net/ChangeLog-7.phpnvdRelease Notes
- rhn.redhat.com/errata/RHSA-2016-2750.htmlnvd
- www.securityfocus.com/bid/92552nvd
- www.securitytracker.com/id/1036680nvd
- security.gentoo.org/glsa/201611-22nvd
- www.tenable.com/security/tns-2016-19nvd
News mentions
0No linked articles in our index yet.