Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-64500 PoC — Symfony 安全漏洞

Source
Associated Vulnerability
Title:Symfony 安全漏洞 (CVE-2025-64500)
Description:Symfony是Symfony公司的一个用于 Web 和控制台应用程序的 PHP 框架以及一组可重用的 PHP 组件。 Symfony 5.4.50之前版本、6.4.29之前版本和7.3.7之前版本存在安全漏洞,该漏洞源于PATH_INFO解析不当,可能导致绕过访问控制规则。
Description
CVE-2025-64500
Readme
# ✨ CVE-2025-64500: Incorrect Parsing of PATH_INFO in Symfony 🚨

## 🌟 **Overview**  
🔍 **CVE-2025-64500** is a **moderate-severity** vulnerability in the **Symfony PHP framework** that allows **limited authorization bypass** due to flawed `PATH_INFO` parsing.  
📅 **Disclosed**: November 12, 2025 (via [Symfony Blog](https://symfony.com/blog/cve-2025-64500-incorrect-parsing-of-path-info-can-lead-to-limited-authorization-bypass)) <sup>1</sup>

---

## 🛡️ **What’s the Issue?**  
⚠️ Symfony’s **HTTP Foundation** component mishandles `PATH_INFO` in URLs.  
🔓 Attackers can craft **malicious URLs** to **bypass route-level access controls**.  
🛑 **Not full admin takeover** — only **limited bypass** (e.g., accessing non-sensitive routes).

| Metric | Value |
|-------|-------|
| 🔗 **Attack Vector** | Network (Remote) |
| ⚡ **Complexity** | Low |
| 🔑 **Privileges Required** | None |
| 👤 **User Interaction** | None |
| 📊 **Impact** | Low (Confidentiality) |
| ⭐ **Estimated CVSS** | ~6.5 (Medium) |

---

## 🚩 **Affected Versions**  
| Component | Vulnerable | Fixed |
|---------|------------|-------|
| `symfony/http-foundation` | `< 7.1.2` | `≥ 7.1.2` |

> ⚠️ **Symfony 6.x (LTS)** users: Apply backported patch if available.

---

## 🛠️ **Fix It Fast!**  
```bash
composer update symfony/http-foundation
```

### 🔧 **Workarounds (If You Can’t Update)**  
1. 🛡️ Add **custom middleware** to sanitize `PATH_INFO`  
2. 🚧 Use **strict URL rules** in Nginx/Apache  
3. 📡 **Log & monitor** suspicious `PATH_INFO` patterns  

---

## 📚 **References**  
- 🔗 [Symfony Security Advisory](https://symfony.com/blog/cve-2025-64500-incorrect-parsing-of-path-info-can-lead-to-limited-authorization-bypass) <sup>1</sup>  
- 🔍 [CVE Record (MITRE)](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64500)  
- ⏳ NVD Entry: *Coming soon*  

---

> 💡 **Pro Tip**: This fits a growing trend of **routing & parsing bugs** in PHP frameworks (see Django’s CVE-2025-64459).  
> 🔍 **Patch now**, **log everything**, and **test your routes**!

Need help testing your Symfony app? Just ask! 🛠️✨
File Snapshot

[4.0K] /data/pocs/3ea9b972ee6e561640fae40e1c6018560f45556c └── [2.1K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.