Symfony Http-Foundation vulnerabilities

12 known vulnerabilities affecting symfony/http-foundation.

Total CVEs
12
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM6LOW2

Vulnerabilities

Page 1 of 1
CVE-2025-64500HIGHPoC≥ 0, < 5.4.50≥ 6.0.0, < 6.4.29+1 more2025-11-12
CVE-2025-64500 [HIGH] CWE-647 Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass ### Description The `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption. ### Resolution The `Request` class now
ghsaosv
CVE-2024-50345LOW≥ 0, < 5.4.46≥ 6.0.0, < 6.4.14+1 more2024-11-06
CVE-2024-50345 [LOW] CWE-601 Symfony vulnerable to open redirect via browser-sanitized URLs Symfony vulnerable to open redirect via browser-sanitized URLs ### Description The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. ### Resolution The `Request::create` methods now assert the URI does not contain invalid characters as defined by https:
ghsaosv
CVE-2014-5244HIGH≥ 2.0.0, < 2.3.19≥ 2.4.0, < 2.4.9+1 more2024-05-30
CVE-2014-5244 [HIGH] CWE-1333 Symfony vulnerable to denial of service via a malicious HTTP Host header Symfony vulnerable to denial of service via a malicious HTTP Host header All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, and 2.5.X versions of the Symfony HttpFoundation component are affected by this security issue. This issue has been fixed in Symfony 2.3.19, 2.4.9, and 2.5.4. Note that no fixes are provided for Symfony 2.0, 2.1, and 2.2 as they are not maintained anymore. Description When an arbit
ghsaosv
CVE-2015-2309MEDIUM≥ 2.0.0, < 2.3.27≥ 2.4.0, < 2.5.11+1 more2024-05-30
CVE-2015-2309 [MEDIUM] CWE-20 Symfony has unsafe methods in the Request class Symfony has unsafe methods in the Request class All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, 2.5.X, and 2.6.X versions of the Symfony HttpFoundation component are affected by this security issue. This issue has been fixed in Symfony 2.3.27, 2.5.11, and 2.6.6. Note that no fixes are provided for Symfony 2.0, 2.1, 2.2, and 2.4 as they are not maintained anymore. ### Description The Symfony\Component\HttpFoundation\Request c
ghsaosv
CVE-2014-6061MEDIUM≥ 2.0.0, < 2.3.19≥ 2.4.0, < 2.4.9+1 more2024-05-30
CVE-2014-6061 [MEDIUM] CWE-20 Symfony has a security issue when parsing the Authorization header Symfony has a security issue when parsing the Authorization header All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, and 2.5.X versions of the Symfony HttpFoundation component are affected by this security issue. This issue has been fixed in Symfony 2.3.19, 2.4.9, and 2.5.4. Note that no fixes are provided for Symfony 2.0, 2.1, and 2.2 as they are not maintained anymore. ### Description When an application u
ghsaosv
CVE-2012-6431MEDIUM≥ 2.0.0, < 2.0.192022-05-17
CVE-2012-6431 [MEDIUM] CWE-287 Symfony Allows URI Restrictions Bypass Via Double-Encoded String Symfony Allows URI Restrictions Bypass Via Double-Encoded String On the Symfony 2.0.x version, there's a security issue that allows access to routes protected by a firewall even when the user is not logged in. Both the Routing component and the Security component uses the path returned by `getPathInfo()` to match a Request. The `getPathInfo()` returns a decoded path, but the Routing component (`Symf
ghsaosv
CVE-2018-11386MEDIUM≥ 2.7.0, < 2.7.48≥ 2.8.0, < 2.8.41+3 more2022-05-14
CVE-2018-11386 [MEDIUM] CWE-613 Symfony DoS Symfony DoS An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
ghsaosv
CVE-2018-14773MEDIUM≥ 2.7.0, < 2.7.49≥ 2.8.0, < 2.8.44+4 more2022-05-13
CVE-2018-14773 [MEDIUM] CWE-349 Symfony HTTP Foundation web cache poisoning Symfony HTTP Foundation web cache poisoning An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed
ghsaosv
CVE-2013-4752MEDIUM≥ 2.0.0, < 2.0.24≥ 2.1.0, < 2.1.12+2 more2022-05-05
CVE-2013-4752 [MEDIUM] CWE-79 Symfony Host Header Injection vulnerability in the HttpFoundation component Symfony Host Header Injection vulnerability in the HttpFoundation component Symfony 2.0.X before 2.0.24, 2.1.X before 2.1.12, 2.2.X before 2.2.5, and 2.3.X before 2.3.3 have an issue in the HttpFoundation component. The Host header can be manipulated by an attacker when the framework is generating an absolute URL. A remote attacker could exploit this vulnerability to inject malicious conten
ghsaosv
CVE-2020-5255LOW≥ 4.4.0, < 4.4.7≥ 5.0.0, < 5.0.72020-03-30
CVE-2020-5255 [LOW] CWE-435 Prevent cache poisoning via a Response Content-Type header in Symfony Prevent cache poisoning via a Response Content-Type header in Symfony Description When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format i
ghsaosv
CVE-2019-10913CRITICAL≥ 2.7.0, < 2.7.51≥ 2.8.0, < 2.8.50+3 more2019-12-02
CVE-2019-10913 [CRITICAL] CWE-79 Invalid HTTP method overrides allow possible XSS or other attacks in Symfony Invalid HTTP method overrides allow possible XSS or other attacks in Symfony In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
ghsaosv
CVE-2019-18888HIGH≥ 2.0.0, < 2.8.52≥ 3.0.0, < 3.4.35+2 more2019-12-02
CVE-2019-18888 [HIGH] CWE-20 Argument injection in a MimeTypeGuesser in Symfony Argument injection in a MimeTypeGuesser in Symfony An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x
ghsaosv