| 0 |
| url |
VCID-4num-z8cg-83gt |
| vulnerability_id |
VCID-4num-z8cg-83gt |
| summary |
Symfony vulnerable to command execution hijack on Windows with Process class
### Description
On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking.
### Resolution
The `Process` class now uses the absolute path to `cmd.exe`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/18ecd03eda3917fdf901a48e72518f911c64a1c9) for branch 5.4.
### Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.7372 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73735 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73744 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73761 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.7374 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73692 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73696 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-51736 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://symfony.com/cve-2024-51736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2024-51736 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-51736, GHSA-qq5c-677p-737q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4num-z8cg-83gt |
|
| 1 |
| url |
VCID-8kq8-2mv9-s3ad |
| vulnerability_id |
VCID-8kq8-2mv9-s3ad |
| summary |
Symfony allows internal address and port enumeration by NoPrivateNetworkHttpClient
### Description
When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration.
### Resolution
The `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks.
The fisrt patch for this issue is available [here](https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b) for branch 5.4.
The second one is available [here](https://github.com/symfony/symfony/commit/b4bf5afdbdcb2fd03da513ee03beeabeb551e5fa) for branch 5.4 also.
### Credits
We would like to thank Linus Karlsson and Chris Smith for reporting the issue and Nicolas Grekas for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50342 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.5823 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58205 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.5821 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58281 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00361 |
| scoring_system |
epss |
| scoring_elements |
0.58264 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66065 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.6603 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50342 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://symfony.com/cve-2024-50342 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2024-50342 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50342, GHSA-9c3x-r3wp-mgxm
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8kq8-2mv9-s3ad |
|
| 2 |
| url |
VCID-9bzz-84cq-ykh2 |
| vulnerability_id |
VCID-9bzz-84cq-ykh2 |
| summary |
Symfony vulnerable to open redirect via browser-sanitized URLs
### Description
The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain.
### Resolution
The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/5a9b08e5740af795854b1b639b7d45b9cbfe8819) for branch 5.4.
### Credits
We would like to thank Sam Mush - IPASSLab && ZGC Lab for reporting the issue and Nicolas Grekas for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50345 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60271 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60359 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60318 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60337 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.6033 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60316 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60266 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60297 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50345 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://symfony.com/cve-2024-50345 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2024-50345 |
|
| 10 |
| reference_url |
https://url.spec.whatwg.org |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T15:21:57Z/ |
|
|
| url |
https://url.spec.whatwg.org |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50345, GHSA-mrqx-rp3w-jpjp
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9bzz-84cq-ykh2 |
|
| 3 |
| url |
VCID-bdhj-np35-sybt |
| vulnerability_id |
VCID-bdhj-np35-sybt |
| summary |
Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83967 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84016 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.8401 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.83982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02089 |
| scoring_system |
epss |
| scoring_elements |
0.84032 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46734 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46734, GHSA-q847-2q57-wmr3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdhj-np35-sybt |
|
| 4 |
| url |
VCID-c8ar-82sr-fqej |
| vulnerability_id |
VCID-c8ar-82sr-fqej |
| summary |
Symfony has an incorrect response from Validator when input ends with `\n`
### Description
It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`.
### Resolution
Symfony now uses the `D` regex modifier to match the entire input.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f) for branch 5.4.
### Credits
We would like to thank Offscript for reporting the issue and Alexandre Daubois for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.4785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47934 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.4788 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47893 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47869 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00246 |
| scoring_system |
epss |
| scoring_elements |
0.47872 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50343 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://symfony.com/cve-2024-50343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2024-50343 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50343, GHSA-g3rh-rrhp-jhh9
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c8ar-82sr-fqej |
|
| 5 |
| url |
VCID-en6a-wp7q-fbfs |
| vulnerability_id |
VCID-en6a-wp7q-fbfs |
| summary |
Symfony allows changing the environment through a query
### Description
When the `register_argc_argv` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request.
### Resolution
The `SymfonyRuntime` now ignores the `argv` values for non-cli SAPIs PHP runtimes
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa) for branch 5.4.
### Credits
We would like to thank Vladimir Dusheyko for reporting the issue and Wouter de Jong for providing the fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99368 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99374 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99372 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.99371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.85618 |
| scoring_system |
epss |
| scoring_elements |
0.9937 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50340 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/symfony/symfony |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/symfony/symfony |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://symfony.com/cve-2024-50340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://symfony.com/cve-2024-50340 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50340, GHSA-x8vp-gf4q-mw5j
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-en6a-wp7q-fbfs |
|
| 6 |
| url |
VCID-p1dw-w76f-gbfv |
| vulnerability_id |
VCID-p1dw-w76f-gbfv |
| summary |
Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass
The `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64500 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14662 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01842 |
| scoring_system |
epss |
| scoring_elements |
0.82999 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83544 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83538 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85295 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.03928 |
| scoring_system |
epss |
| scoring_elements |
0.88321 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03928 |
| scoring_system |
epss |
| scoring_elements |
0.88316 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03928 |
| scoring_system |
epss |
| scoring_elements |
0.88296 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.03928 |
| scoring_system |
epss |
| scoring_elements |
0.88291 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64500 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-64500, GHSA-3rg7-wf37-54rm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p1dw-w76f-gbfv |
|
| 7 |
| url |
VCID-rgh3-ef8t-k3ec |
| vulnerability_id |
VCID-rgh3-ef8t-k3ec |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40689 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40678 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40634 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40653 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40688 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4061 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40661 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24894 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24894, GHSA-h7vf-5wrv-9fhv, GMS-2023-209, GMS-2023-212
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgh3-ef8t-k3ec |
|
| 8 |
| url |
VCID-thtp-ehsj-t3ej |
| vulnerability_id |
VCID-thtp-ehsj-t3ej |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24895 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05621 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05639 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05684 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0569 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05718 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05691 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0566 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24895 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24895, GHSA-3gv2-29qc-v67m, GMS-2023-210, GMS-2023-211
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-thtp-ehsj-t3ej |
|