Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/symfony/serializer@6.2.0-RC1 |
| Type | composer |
| Namespace | symfony |
| Name | serializer |
| Version | 6.2.0-RC1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 6.3.8 |
| Latest_non_vulnerable_version | 6.3.8 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-bdhj-np35-sybt |
| vulnerability_id |
VCID-bdhj-np35-sybt |
| summary |
Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83967 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84016 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.8401 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84032 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46734 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46734, GHSA-q847-2q57-wmr3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdhj-np35-sybt |
|
| 1 |
| url |
VCID-znfv-ngqc-fudw |
| vulnerability_id |
VCID-znfv-ngqc-fudw |
| summary |
Cross-site scripting
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now does not return any user-submitted input in its response. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85344 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85428 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85408 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.8541 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85396 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85365 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02516 |
| scoring_system |
epss |
| scoring_elements |
0.85362 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46735 |
|
| 1 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://symfony.com/cve-2023-46735 |
| reference_id |
CVE-2023-46735 |
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2023-46735 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46735, GHSA-72x2-5c85-6wmr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znfv-ngqc-fudw |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/symfony/serializer@6.2.0-RC1 |