SB2020012747 - Improper access control in Sylius



SB2020012747 - Improper access control in Sylius

Published: January 27, 2020 Updated: April 27, 2026

Security Bulletin ID SB2020012747
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Improper access control (CVE-ID: CVE-2020-5218)

The vulnerability allows a remote attacker to switch channels in production environments.

The vulnerability exists due to improper access control in the channel switching feature when processing the _channel_code GET parameter. A remote attacker can supply a crafted _channel_code parameter to switch channels in production environments.

The issue occurs when sylius_channel.debug is not explicitly set, causing the debug feature to remain enabled because the default %kernel.debug% value is not resolved and is cast to boolean.


Remediation

Install update from vendor's website.