Interpretation Conflict in Symfony - CVE-2026-46626

 

Interpretation Conflict in Symfony - CVE-2026-46626

Published: May 21, 2026


Vulnerability identifier: #VU132053
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-46626
CWE-ID: CWE-436
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: SensioLabs
Affected software:
Symfony

Detailed vulnerability description

The vulnerability allows a remote attacker to modify the application environment and debug settings.

The vulnerability exists due to interpretation conflict in SymfonyRuntime::getInput() when processing a crafted query string in a web request with register_argc_argv enabled. A remote attacker can send a specially crafted GET request to modify the application environment and debug settings.

Exploitation requires a web SAPI deployment with register_argc_argv enabled, and the application must be booted through symfony/runtime.


How to mitigate CVE-2026-46626

Install security update from vendor's website.

Sources