Description
In SyliusResourceBundle before versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4, rrequest parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
Scores
CVSS v3
7.7
EPSS
0.0106
EPSS Percentile
77.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Details
CWE
CWE-917
CWE-74
Status
published
Products (2)
sylius/resource-bundle
1.4.0 - 1.4.7Packagist
sylius/syliusresourcebundle
< 1.3.13
Published
Aug 20, 2020
Tracked Since
Feb 18, 2026