Site icon Fix I.T. Phill – Your Go-To Tech Guru

PHP SOAP CVE-2026-6722: cPanel Hosting Patch Guide

PHP SOAP CVE-2026-6722 hosting patch guide with cPanel server security shield

PHP SOAP CVE-2026-6722 hosting patch guide with cPanel server security shield

Impact statement: CVE-2026-6722 is a critical PHP SOAP extension vulnerability affecting PHP 8.2 before 8.2.31, 8.3 before 8.3.31, 8.4 before 8.4.21, and 8.5 before 8.5.6. The PHP Group rates the issue CVSS 9.5. If a public application processes untrusted SOAP input on a vulnerable PHP build, the worst-case impact is remote code execution inside the web application account.

This is a patch and mitigation guide for hosting providers, WHM/cPanel admins, VPS owners, and WordPress operators. We are not publishing attack strings, request details, or lab notes. The useful public answer is inventory PHP, patch every active branch, restart services, verify the fixed versions, and review logs for suspicious application behavior.

Who Should Care

If the SOAP extension is not installed and no application on the server uses it, exposure is lower. Still patch PHP, because the same May 2026 PHP releases include other security fixes across FPM, PDO Firebird, SOAP, Standard, MBString, DOM, and related components.

Patched PHP Targets

WHM/cPanel Patch Walkthrough

Use WHM first if you prefer the supported UI path: WHM > EasyApache 4, update the active PHP profiles, then confirm MultiPHP Manager still assigns the right PHP version to each site.

/usr/local/cpanel/cpanel -V
/usr/local/cpanel/scripts/upcp --force
dnf clean all
dnf update 'ea-php*' 'ea-apache24*' -y
/usr/local/cpanel/scripts/restartsrv_httpd
/usr/local/cpanel/scripts/restartsrv_apache_php_fpm

After the update, verify the installed EasyApache PHP packages and the active PHP handler map.

rpm -qa | grep '^ea-php' | sort
/usr/local/cpanel/bin/rebuild_phpconf --current
php -v
php -m | grep -i '^soap$' || true

AlmaLinux, Rocky Linux, CloudLinux, And RHEL

On non-cPanel servers, update from your OS vendor, CloudLinux, Remi, or the PHP repository you actually use. Do not mix repositories blindly on production hosting nodes.

dnf clean all
dnf update 'php*' -y
php -v
php -m | grep -i '^soap$' || true
systemctl restart php-fpm httpd nginx 2>/dev/null || true

Debian And Ubuntu

Use your distro security repository or the PHP repository already configured on the server. Verify whether the package version is a new upstream release or a backported security build.

apt update
apt list --upgradable | grep -E '^php|php8'
apt upgrade
php -v
php -m | grep -i '^soap$' || true
systemctl restart apache2 nginx php*-fpm 2>/dev/null || true

Containers And App Stacks

docker compose pull
docker compose build --pull
docker compose up -d
docker compose exec php php -v
docker compose exec php php -m | grep -i '^soap$' || true

Temporary Mitigation

Patching is the fix. If you cannot patch immediately, identify applications that use SOAP and restrict access to those services as much as the business allows. If an application does not need SOAP, disable the extension for that PHP version or pool after testing.

For shared hosting, do not disable SOAP globally without checking customer impact. Some payment, shipping, ERP, CRM, and legacy integrations still rely on it.

Post-Patch Review

What To Tell Customers

A critical PHP SOAP security issue was published for several PHP branches. We patched or are patching the affected PHP builds, restarting web services, and checking for application errors. Sites that do not use SOAP have lower exposure, but the PHP update is still important because the same release batch fixes multiple PHP security issues.

Sources

Exit mobile version