Symfony Http-Foundation vulnerabilities
12 known vulnerabilities affecting symfony/http-foundation.
Total CVEs
12
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM6LOW2
Vulnerabilities
Page 1 of 1
CVE-2025-64500HIGHPoC≥ 0, < 5.4.50≥ 6.0.0, < 6.4.29+1 more2025-11-12
CVE-2025-64500 [HIGH] CWE-647 Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass
Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass
### Description
The `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption.
### Resolution
The `Request` class now
ghsaosv
CVE-2024-50345LOW≥ 0, < 5.4.46≥ 6.0.0, < 6.4.14+1 more2024-11-06
CVE-2024-50345 [LOW] CWE-601 Symfony vulnerable to open redirect via browser-sanitized URLs
Symfony vulnerable to open redirect via browser-sanitized URLs
### Description
The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain.
### Resolution
The `Request::create` methods now assert the URI does not contain invalid characters as defined by https:
ghsaosv
CVE-2014-5244HIGH≥ 2.0.0, < 2.3.19≥ 2.4.0, < 2.4.9+1 more2024-05-30
CVE-2014-5244 [HIGH] CWE-1333 Symfony vulnerable to denial of service via a malicious HTTP Host header
Symfony vulnerable to denial of service via a malicious HTTP Host header
All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, and 2.5.X versions of the Symfony HttpFoundation component are affected by this security issue.
This issue has been fixed in Symfony 2.3.19, 2.4.9, and 2.5.4. Note that no fixes are provided for Symfony 2.0, 2.1, and 2.2 as they are not maintained anymore.
Description
When an arbit
ghsaosv
CVE-2015-2309MEDIUM≥ 2.0.0, < 2.3.27≥ 2.4.0, < 2.5.11+1 more2024-05-30
CVE-2015-2309 [MEDIUM] CWE-20 Symfony has unsafe methods in the Request class
Symfony has unsafe methods in the Request class
All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, 2.5.X, and 2.6.X versions of the Symfony HttpFoundation component are affected by this security issue.
This issue has been fixed in Symfony 2.3.27, 2.5.11, and 2.6.6. Note that no fixes are provided for Symfony 2.0, 2.1, 2.2, and 2.4 as they are not maintained anymore.
### Description
The Symfony\Component\HttpFoundation\Request c
ghsaosv
CVE-2014-6061MEDIUM≥ 2.0.0, < 2.3.19≥ 2.4.0, < 2.4.9+1 more2024-05-30
CVE-2014-6061 [MEDIUM] CWE-20 Symfony has a security issue when parsing the Authorization header
Symfony has a security issue when parsing the Authorization header
All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, and 2.5.X versions of the Symfony HttpFoundation component are affected by this security issue.
This issue has been fixed in Symfony 2.3.19, 2.4.9, and 2.5.4. Note that no fixes are provided for Symfony 2.0, 2.1, and 2.2 as they are not maintained anymore.
### Description
When an application u
ghsaosv
CVE-2012-6431MEDIUM≥ 2.0.0, < 2.0.192022-05-17
CVE-2012-6431 [MEDIUM] CWE-287 Symfony Allows URI Restrictions Bypass Via Double-Encoded String
Symfony Allows URI Restrictions Bypass Via Double-Encoded String
On the Symfony 2.0.x version, there's a security issue that allows access to routes protected by a firewall even when the user is not logged in.
Both the Routing component and the Security component uses the path returned by `getPathInfo()` to match a Request. The `getPathInfo()` returns a decoded path, but the Routing component (`Symf
ghsaosv
CVE-2018-11386MEDIUM≥ 2.7.0, < 2.7.48≥ 2.8.0, < 2.8.41+3 more2022-05-14
CVE-2018-11386 [MEDIUM] CWE-613 Symfony DoS
Symfony DoS
An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
ghsaosv
CVE-2018-14773MEDIUM≥ 2.7.0, < 2.7.49≥ 2.8.0, < 2.8.44+4 more2022-05-13
CVE-2018-14773 [MEDIUM] CWE-349 Symfony HTTP Foundation web cache poisoning
Symfony HTTP Foundation web cache poisoning
An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed
ghsaosv
CVE-2013-4752MEDIUM≥ 2.0.0, < 2.0.24≥ 2.1.0, < 2.1.12+2 more2022-05-05
CVE-2013-4752 [MEDIUM] CWE-79 Symfony Host Header Injection vulnerability in the HttpFoundation component
Symfony Host Header Injection vulnerability in the HttpFoundation component
Symfony 2.0.X before 2.0.24, 2.1.X before 2.1.12, 2.2.X before 2.2.5, and 2.3.X before 2.3.3 have an issue in the HttpFoundation component. The Host header can be manipulated by an attacker when the framework is generating an absolute URL. A remote attacker could exploit this vulnerability to inject malicious conten
ghsaosv
CVE-2020-5255LOW≥ 4.4.0, < 4.4.7≥ 5.0.0, < 5.0.72020-03-30
CVE-2020-5255 [LOW] CWE-435 Prevent cache poisoning via a Response Content-Type header in Symfony
Prevent cache poisoning via a Response Content-Type header in Symfony
Description
When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format i
ghsaosv
CVE-2019-10913CRITICAL≥ 2.7.0, < 2.7.51≥ 2.8.0, < 2.8.50+3 more2019-12-02
CVE-2019-10913 [CRITICAL] CWE-79 Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
ghsaosv
CVE-2019-18888HIGH≥ 2.0.0, < 2.8.52≥ 3.0.0, < 3.4.35+2 more2019-12-02
CVE-2019-18888 [HIGH] CWE-20 Argument injection in a MimeTypeGuesser in Symfony
Argument injection in a MimeTypeGuesser in Symfony
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x
ghsaosv