Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical PHP Composer Vulnerabilities Patched

Critical PHP Composer Vulnerabilities Patched

Posted on April 14, 2026 By CWS

Two critical security flaws have been identified and addressed in Composer, the widely-used package manager for PHP. These vulnerabilities, if exploited, could lead to arbitrary command execution, posing significant risks to developers and their systems. The flaws are specifically linked to the Perforce version control system (VCS) driver used within Composer.

Details of the Vulnerabilities

The first vulnerability, tracked as CVE-2026-40176 with a CVSS score of 7.8, involves improper input validation. It allows malicious actors to manipulate a composer.json file to introduce arbitrary commands, potentially executing them under the user’s context who is running Composer. The second vulnerability, CVE-2026-40261, bears a higher CVSS score of 8.8. This flaw arises from inadequate escaping, enabling attackers to inject harmful commands via crafted source references that include shell metacharacters.

In both scenarios, the injected commands could be executed by Composer even if the Perforce VCS is not installed, as per the maintainers’ advisory.

Affected Versions and Security Recommendations

The vulnerabilities affect Composer versions between 2.3 and 2.9.6, and 2.0 and 2.2.27. These issues have been rectified in versions 2.9.6 and 2.2.27, respectively. Users are strongly urged to update their Composer installations immediately to these secure versions.

For those who cannot apply the patches immediately, it is recommended to thoroughly inspect composer.json files for any suspicious configurations before executing Composer commands. Ensuring the use of trusted repositories and avoiding the installation of dependencies with the ‘–prefer-dist’ or ‘preferred-install: dist’ settings are also advised.

Proactive Measures and Future Outlook

Composer’s team has proactively scanned Packagist.org, the central repository for PHP packages, and has found no evidence of these vulnerabilities being exploited through the distribution of malicious packages. In response to the discovery, the publication of Perforce source metadata on Packagist.org has been disabled as a precautionary measure since April 10, 2026. A new release is anticipated for Private Packagist Self-Hosted users to further enhance security measures.

In conclusion, while no active exploitation has been detected, the immediate application of these patches is crucial to safeguard against potential threats. Keeping software up-to-date and adhering to best practices in security configurations remain pivotal in protecting systems from such vulnerabilities.

The Hacker News Tags:command injection, Composer, CVE-2026-40176, CVE-2026-40261, Cybersecurity, DevSecOps, input validation, Packagist, Patches, Perforce VCS, PHP, Private Packagist, security vulnerabilities, Software Security, software update

Post navigation

Previous Post: Critical Vulnerability in etcd Allows Unauthorized API Access
Next Post: Earn CPE Credits with SRA’s Purple Team Exercises

Related Posts

Key Findings from the Blue Report 2025 Key Findings from the Blue Report 2025 The Hacker News
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies The Hacker News
SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities
  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities
  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark