Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. symfony/security-http
  4. ›
  5. CVE-2023-46734

CVE-2023-46734: Cross-site scripting

November 10, 2023 (updated November 24, 2023)

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use is_safe=html but don’t actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.

References

  • github.com/symfony/symfony/commit/5d095d5feb1322b16450284a04d6bb48d1198f54
  • github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c
  • github.com/symfony/symfony/security/advisories/GHSA-q847-2q57-wmr3
  • nvd.nist.gov/vuln/detail/CVE-2023-46734

Code Behaviors & Features

Detect and mitigate CVE-2023-46734 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 4.4.51, all versions starting from 5.0.0 before 5.4.31, all versions starting from 6.0.0 before 6.3.8

Fixed versions

  • 5.4.31
  • 6.3.8

Solution

Upgrade to versions 5.4.31, 6.3.8 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/symfony/security-http/CVE-2023-46734.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:41 +0000.