Interpretation Conflict in Symfony - CVE-2026-46626
Published: May 21, 2026
Symfony
Detailed vulnerability description
The vulnerability allows a remote attacker to modify the application environment and debug settings.
The vulnerability exists due to interpretation conflict in SymfonyRuntime::getInput() when processing a crafted query string in a web request with register_argc_argv enabled. A remote attacker can send a specially crafted GET request to modify the application environment and debug settings.
Exploitation requires a web SAPI deployment with register_argc_argv enabled, and the application must be booted through symfony/runtime.