logo

CVE-2025-47946 symfony/ux-live-component

Package

Manager: composer
Name: symfony/ux-live-component
Vulnerable Version: >=0 <2.25.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00039 pctl0.10685

Details

Symfony UX allows unsanitized HTML attribute injection via ComponentAttributes ### Impact Rendering `{{ attributes }}` or using any method that returns a `ComponentAttributes` instance (e.g. `only()`, `defaults()`, `without()`) ouputs attribute values directly without escaping. If these values are unsafe (e.g. contain user input), this can lead to HTML attribute injection and XSS vulnerabilities. ### Patches The issue is fixed in version `2.25.1` of `symfony/ux-twig-component` by using Twig's `EscaperRuntime` to properly escape HTML attributes in `ComponentAttributes`. If you use `symfony/ux-live-component`, you must also update it to `2.25.1` to benefit from the fix, as it reuses the `ComponentAttributes` class internally. ### Workarounds Until you can upgrade, avoid rendering `{{ attributes }}` or derived objects directly if it may contain untrusted values. Instead, use `{{ attributes.render('name') }}` for safe output of individual attributes. ### References GitHub repository: [symfony/ux](https://github.com/symfony/ux)

Metadata

Created: 2025-05-19T22:24:45Z
Modified: 2025-08-29T21:08:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-5j3w-5pcr-f8hg/GHSA-5j3w-5pcr-f8hg.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-5j3w-5pcr-f8hg
Finding: F008
Auto approve: 1