CVE-2024-57610: Withdrawn Advisory: Sylius allows unrestricted brute-force attacks on user accounts
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81869%
CWE
Published
2/6/2025
Updated
2/7/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sylius/sylius | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Sylius' authentication flow not containing built-in rate limiting. While the SecurityController::loginAction is the primary entry point for authentication requests, its vulnerability is contextual - it becomes an attack vector when deployed without complementary security layers like firewalls or rate-limiting middleware. The medium confidence reflects that the vulnerability exists in the absence of security features rather than an explicit code flaw, consistent with the vendor's position that protection is expected to be implemented at the infrastructure level.