CVE-2026-24739Argument Injection in Symfony

CWE-88Argument Injection6 documents6 sources
Severity
6.3MEDIUMNVD
EPSS
0.0%
top 99.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 28

Description

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these c

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:HExploitability: 1.0 | Impact: 5.2

Affected Packages4 packages

Packagistsymfony/process6.46.4.33+4
CVEListV5symfony/symfony< 5.4.51+4
Packagistsymfony/symfony6.46.4.33+4
NVDsensiolabs/symfony6.4.06.4.33+4

Patches

🔴Vulnerability Details

3
OSV
Symfony's incorrect argument escaping under MSYS2/Git Bash can lead to destructive file operations on Windows2026-01-28
CVEList
Symfony has incorrect argument escaping under MSYS2/Git Bash on Windows that can lead to destructive file operations2026-01-28
GHSA
Symfony's incorrect argument escaping under MSYS2/Git Bash can lead to destructive file operations on Windows2026-01-28

📋Vendor Advisories

1
Debian
CVE-2026-24739: symfony - Symfony is a PHP framework for web and console applications and a set of reusabl...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-24739 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-24739 — Argument Injection in Symfony | cvebase