symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 04 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Sensiolabs Sensiolabs symfony | |
| CPEs | cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* | |
| Vendors & Products | Sensiolabs Sensiolabs symfony | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Thu, 07 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 06 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Open redirect via browser-sanitized URLs in symfony/http-foundation | |
| Weaknesses | CWE-601 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-06T20:56:21.062Z
Updated: 2024-11-07T15:22:48.319Z
Reserved: 2024-10-22T17:54:40.955Z
Link: CVE-2024-50345
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-11-07T15:22:37.766Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-11-06T21:15:06.383
Modified: 2025-09-04T16:09:49.083
Link: CVE-2024-50345
 Redhat
                        Redhat
                    No data.