// For flags

CVE-2019-10909

Debian Security Advisory 4441-1

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.

En Symfony anterior de la versión 2.7.51, versión 2.8.x anterior de 2.8.50, versión 3.x anterior de 3.4.26, versión 4.x anterior de 4.1.12 y versión 4.2.x anterior de 4.2.7, los mensajes de validación no son evadidos, lo que puede llevar a una vulnerabilidad de XSS cuando una entrada del usuario sea incluida. Esto está relacionado con symfony/framework-bundle

Multiple vulnerabilities were discovered in the Symfony PHP framework which could lead to cache bypass, authentication bypass, information disclosure, open redirect, cross-site request forgery, deletion of arbitrary files, or arbitrary code execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-07 CVE Reserved
  • 2019-05-10 CVE Published
  • 2024-08-04 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 2.7.0 < 2.7.51
Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.7.0 < 2.7.51"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 2.8.0 < 2.8.50
Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.8.0 < 2.8.50"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 3.4.0 < 3.4.26
Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.4.0 < 3.4.26"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 4.1.0 < 4.1.12
Search vendor "Sensiolabs" for product "Symfony" and version " >= 4.1.0 < 4.1.12"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 4.2.0 < 4.2.7
Search vendor "Sensiolabs" for product "Symfony" and version " >= 4.2.0 < 4.2.7"
-
Affected
Drupal
Search vendor "Drupal"
Drupal
Search vendor "Drupal" for product "Drupal"
>= 8.5.0 < 8.5.15
Search vendor "Drupal" for product "Drupal" and version " >= 8.5.0 < 8.5.15"
-
Affected
Drupal
Search vendor "Drupal"
Drupal
Search vendor "Drupal" for product "Drupal"
>= 8.6.0 < 8.6.15
Search vendor "Drupal" for product "Drupal" and version " >= 8.6.0 < 8.6.15"
-
Affected