Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5
purl pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-9bzz-84cq-ykh2 Symfony vulnerable to open redirect via browser-sanitized URLs ### Description The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. ### Resolution The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/ The patch for this issue is available [here](https://github.com/symfony/symfony/commit/5a9b08e5740af795854b1b639b7d45b9cbfe8819) for branch 5.4. ### Credits We would like to thank Sam Mush - IPASSLab && ZGC Lab for reporting the issue and Nicolas Grekas for providing the fix. CVE-2024-50345
GHSA-mrqx-rp3w-jpjp
VCID-c8ar-82sr-fqej Symfony has an incorrect response from Validator when input ends with `\n` ### Description It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`. ### Resolution Symfony now uses the `D` regex modifier to match the entire input. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f) for branch 5.4. ### Credits We would like to thank Offscript for reporting the issue and Alexandre Daubois for providing the fix. CVE-2024-50343
GHSA-g3rh-rrhp-jhh9
VCID-p1dw-w76f-gbfv Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass The `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption. CVE-2025-64500
GHSA-3rg7-wf37-54rm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T10:16:38.389660+00:00 Debian Importer Fixing VCID-p1dw-w76f-gbfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-15T16:12:35.192540+00:00 Debian Oval Importer Fixing VCID-9bzz-84cq-ykh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:26:17.584751+00:00 Debian Oval Importer Fixing VCID-c8ar-82sr-fqej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T06:54:49.373004+00:00 Debian Importer Fixing VCID-p1dw-w76f-gbfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T16:00:00.259003+00:00 Debian Oval Importer Fixing VCID-9bzz-84cq-ykh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:14:25.130839+00:00 Debian Oval Importer Fixing VCID-c8ar-82sr-fqej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T18:35:52.045607+00:00 Debian Importer Fixing VCID-p1dw-w76f-gbfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T15:53:04.059067+00:00 Debian Oval Importer Fixing VCID-9bzz-84cq-ykh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:09:18.883603+00:00 Debian Oval Importer Fixing VCID-c8ar-82sr-fqej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0