Search for vulnerabilities
Vulnerability ID | VCID-pm5w-g66m-sybw |
Aliases |
CVE-2013-1348
GHSA-2r5h-6r7v-5m7c |
Summary | Symphony Vulnerable to PHP Code Injection via YAML Parsing The `Yaml::parse` function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.0 |
Risk | 4.0 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
epss | 0.00619 | https://api.first.org/data/v1/epss?cve=CVE-2013-1348 |
generic_textual | HIGH | https://exchange.xforce.ibmcloud.com/vulnerabilities/81550 |
generic_textual | HIGH | https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2013-1348.yaml |
generic_textual | HIGH | https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/yaml/CVE-2013-1348.yaml |
generic_textual | HIGH | https://github.com/symfony/symfony |
generic_textual | HIGH | https://github.com/symfony/symfony/commit/ac756bf39e646b4e130fad058d10a0228dbd9779 |
generic_textual | HIGH | https://nvd.nist.gov/vuln/detail/CVE-2013-1348 |
generic_textual | HIGH | https://symfony.com/blog/security-release-symfony-2-0-22-and-2-1-7-released |
generic_textual | HIGH | https://web.archive.org/web/20150612022223/http://www.securityfocus.com/bid/57574 |
Percentile | 0.68983 |
EPSS Score | 0.00619 |
Published At | June 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:27:30.867149+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2r5h-6r7v-5m7c/GHSA-2r5h-6r7v-5m7c.json | 36.1.3 |