Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical PHP Composer Vulnerabilities Patched

Critical PHP Composer Vulnerabilities Patched

Posted on April 14, 2026 By CWS

Two critical security flaws have been identified and addressed in Composer, the widely-used package manager for PHP. These vulnerabilities, if exploited, could lead to arbitrary command execution, posing significant risks to developers and their systems. The flaws are specifically linked to the Perforce version control system (VCS) driver used within Composer.

Details of the Vulnerabilities

The first vulnerability, tracked as CVE-2026-40176 with a CVSS score of 7.8, involves improper input validation. It allows malicious actors to manipulate a composer.json file to introduce arbitrary commands, potentially executing them under the user’s context who is running Composer. The second vulnerability, CVE-2026-40261, bears a higher CVSS score of 8.8. This flaw arises from inadequate escaping, enabling attackers to inject harmful commands via crafted source references that include shell metacharacters.

In both scenarios, the injected commands could be executed by Composer even if the Perforce VCS is not installed, as per the maintainers’ advisory.

Affected Versions and Security Recommendations

The vulnerabilities affect Composer versions between 2.3 and 2.9.6, and 2.0 and 2.2.27. These issues have been rectified in versions 2.9.6 and 2.2.27, respectively. Users are strongly urged to update their Composer installations immediately to these secure versions.

For those who cannot apply the patches immediately, it is recommended to thoroughly inspect composer.json files for any suspicious configurations before executing Composer commands. Ensuring the use of trusted repositories and avoiding the installation of dependencies with the ‘–prefer-dist’ or ‘preferred-install: dist’ settings are also advised.

Proactive Measures and Future Outlook

Composer’s team has proactively scanned Packagist.org, the central repository for PHP packages, and has found no evidence of these vulnerabilities being exploited through the distribution of malicious packages. In response to the discovery, the publication of Perforce source metadata on Packagist.org has been disabled as a precautionary measure since April 10, 2026. A new release is anticipated for Private Packagist Self-Hosted users to further enhance security measures.

In conclusion, while no active exploitation has been detected, the immediate application of these patches is crucial to safeguard against potential threats. Keeping software up-to-date and adhering to best practices in security configurations remain pivotal in protecting systems from such vulnerabilities.

The Hacker News Tags:command injection, Composer, CVE-2026-40176, CVE-2026-40261, Cybersecurity, DevSecOps, input validation, Packagist, Patches, Perforce VCS, PHP, Private Packagist, security vulnerabilities, Software Security, software update

Post navigation

Previous Post: Critical Vulnerability in etcd Allows Unauthorized API Access
Next Post: Earn CPE Credits with SRA’s Purple Team Exercises

Related Posts

Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News
CISO’s Expert Guide To AI Supply Chain Attacks CISO’s Expert Guide To AI Supply Chain Attacks The Hacker News
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits The Hacker News
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets The Hacker News
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties The Hacker News
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark