{"id":"CVE-2016-7125","details":"ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.","modified":"2026-04-11T05:00:44.510677Z","published":"2016-09-12T01:59:03.427Z","related":["SUSE-SU-2016:2328-1","SUSE-SU-2016:2408-1","SUSE-SU-2016:2459-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2"],"references":[{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-19"},{"type":"WEB","url":"http://www.securityfocus.com/bid/92552"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036680"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72681"},{"type":"FIX","url":"https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2016/09/02/9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"38980c9ea4156ce52a53f9f3e1007ea3d787fa11"},{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"introduced":"0"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"},{"introduced":"0"},{"last_affected":"4e1b8701573698f56e12672e4991d7e6239138d2"},{"introduced":"0"},{"last_affected":"e09845d32614a19188632f410316478fbb440ebd"},{"introduced":"0"},{"last_affected":"249a8fd9ae2324c84ede7ecfca6f6026e6d87df6"},{"introduced":"0"},{"last_affected":"734a5fca2c4731e34eca551f28be9a10ffc3f3c9"},{"introduced":"0"},{"last_affected":"fb59213fc461f079bc218abf44cb5e2b4db2182c"},{"introduced":"0"},{"last_affected":"a36407215f69ba2debf77933dcb3faa0c3ba2d04"},{"introduced":"0"},{"last_affected":"9d582eba7448f1495fae62b13d95d2844ce6b28a"},{"fixed":"8763c6090d627d8bb0ee1d030c30e58f406be9ce"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.6.24"},{"introduced":"0"},{"last_affected":"7.0.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.0.4"},{"introduced":"0"},{"last_affected":"7.0.5"},{"introduced":"0"},{"last_affected":"7.0.6"},{"introduced":"0"},{"last_affected":"7.0.7"},{"introduced":"0"},{"last_affected":"7.0.8"},{"introduced":"0"},{"last_affected":"7.0.9"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-5.6.24","php-5.6.24RC1","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1","php-7.0.3","php-7.0.4","php-7.0.4RC1","php-7.0.5","php-7.0.5RC1","php-7.0.6","php-7.0.6RC1","php-7.0.7","php-7.0.7RC1","php-7.0.8","php-7.0.8RC1","php-7.0.9","php-7.0.9RC1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7125.json","vanir_signatures":[{"id":"CVE-2016-7125-457ca896","digest":{"length":1163,"function_hash":"107788997388467024839094674994353118451"},"signature_version":"v1","deprecated":false,"signature_type":"Function","target":{"function":"PS_SERIALIZER_DECODE_FUNC","file":"ext/session/session.c"},"source":"https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce"},{"id":"CVE-2016-7125-a574bdc3","digest":{"threshold":0.9,"line_hashes":["106887075294435159751258907670730008067","17824720681596088120189278330761514758","202896345813601310887623560120731495632","117052572558832084793886867158824318295","44558091930348656911918902179235958927","25689418931545254097413809414195322921","46291548331210342705707066555522636092","22405959284939623801867279044200194773","253349475471412221446371530273326942972","307987088346644050011362115553298844560","21849972807398295414146614750964103027","135091234369615819904298797774804809646","212587539786642919187065182908910175992","164147441189634810453409513976303397257","299762411656234981452921045448798488259","86363540910675021090373648322452023730","87124428916936756879781165876873233580","92888288879166682273108158547994072383","300292442740619851530068025798914404607","165538226259317472163581441656359149941","104203044083152032254150804362834268734","131556912046690260698768632303368932509","113633271068740106901875594896553919787","27278386797999691503366223039879666032","131461043665418090392346183123079504757","106887075294435159751258907670730008067","17824720681596088120189278330761514758","59145684528599394907719923743168088306","224343750237432897445522311831233044126","190492681665563352313897654540545552431","236937198641781685019627809877323116077","293714124336778393489331498732430608708","322569731665167814852020378719603476768","263351328584288244753338650312777852442","283764074968325309223946918645366847251","265328183363365076878376663474967488097","2902288216488715682764002233285881109","212587539786642919187065182908910175992","18567545397569729061884670908534903939","66557614463077134263858336184600495855","83677007198874543882106702068780462468","83313525255790333985243127477768377647","311598070549299744904677263406695738569","131556912046690260698768632303368932509","307869019885692082910704881025654852690","142355728702177090617247597022589729735","324272434018370530187044176789325173173"]},"signature_version":"v1","deprecated":false,"signature_type":"Line","target":{"file":"ext/session/session.c"},"source":"https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce"},{"id":"CVE-2016-7125-a9504544","digest":{"length":1107,"function_hash":"146188824495324580359682585107774984024"},"signature_version":"v1","deprecated":false,"signature_type":"Function","target":{"function":"PS_SERIALIZER_DECODE_FUNC","file":"ext/session/session.c"},"source":"https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce"}],"vanir_signatures_modified":"2026-04-11T05:00:44Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}