Symfony Runtime Ignores Arguments in Non-SAPI PHP Runtimes
CVE-2024-50340
Summary
The vulnerability CVE-2024-50340 affects the Symfony Runtime component in versions =6, =7, and <7.1.7, allowing unauthorized access to sensitive resources. By appending ?+--env=dev to a URL, attackers can force the application into the dev environment, granting remote access to the Symfony profiler. This can lead to the leaking of sensitive information and potentially executing arbitrary code. The issue has been fixed in Symfony 5.4.46, 6.4.14, and 7.1.7, and all users are advised to upgrade. There are no known workarounds for this vulnerability.
News Articles

Understanding CVE-2024-50340 - Remote Access to Symfony Profiler - IONIX
CVE-2024-50340 A security issue in Symfony versions =6, =7, <7.1.7 of the Symfony Runtime component allows unauthorized access to sensitive resources.
References
EPSS Score
82% chance of being exploited in the next 30 days.
Timeline
- 📰
First article discovered by IONIX
Vulnerability published