-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the default enabling of object support in Symfony's YAML parsing functions. The Yaml::parse and Parser::parse methods are the primary entry points for parsing YAML input, and in affected versions, they did not disable object deserialization by default. The Inline::parse function directly processes the !!php/object tags, unserializing them without validation. The GitHub commit introduced flags to disable this behavior, confirming these functions' roles in the vulnerability. The CWE-94 (Code Injection) classification aligns with the unserialize-based exploitation vector.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| symfony/symfony | composer | >= 2.2.0-BETA1, < 2.2.0-BETA2 | 2.2.0-BETA2 |
| symfony/symfony | composer | >= 2.0.0, < 2.0.22 | 2.0.22 |
| symfony/symfony | composer | >= 2.1.0, < 2.1.7 | 2.1.7 |
| symfony/yaml | composer | >= 2.0.0, < 2.0.22 | 2.0.22 |
| symfony/yaml | composer | >= 2.1.0, < 2.1.7 | 2.1.7 |
| symfony/yaml | composer | >= 2.2.0-BETA1, < 2.2.0-BETA2 | 2.2.0-BETA2 |
Ongoing coverage of React2Shell