Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4200-1 | symfony security update |
Debian DSA |
DSA-5809-1 | symfony security update |
EUVD |
EUVD-2024-3285 | symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-mrqx-rp3w-jpjp | Symfony vulnerable to open redirect via browser-sanitized URLs |
Ubuntu USN |
USN-7272-1 | Symfony vulnerabilities |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 04 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sensiolabs
Sensiolabs symfony |
|
| CPEs | cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sensiolabs
Sensiolabs symfony |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 07 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Open redirect via browser-sanitized URLs in symfony/http-foundation | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T19:31:47.017Z
Reserved: 2024-10-22T17:54:40.955Z
Link: CVE-2024-50345
Updated: 2025-11-03T19:31:47.017Z
Status : Modified
Published: 2024-11-06T21:15:06.383
Modified: 2025-11-03T20:16:36.520
Link: CVE-2024-50345
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN