CVE-2026-24739
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-28

Last updated on: 2026-02-02

Assigner: GitHub, Inc.

Description
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as β€œspecial” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents of a broader directory or drive. The issue is particularly relevant when untrusted input can influence process arguments (directly or indirectly, e.g. via repository paths, extracted archive paths, temporary directories, or user-controlled configuration). Versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5 contains a patch for the issue. Some workarounds are available. Avoid running PHP/one's own tooling from MSYS2-based shells on Windows; prefer cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing `=` (and similar MSYS2-sensitive characters) to Symfony Process when operating under Git Bash/MSYS2. Where applicable, configure MSYS2 to disable or restrict argument conversion (e.g. via `MSYS2_ARG_CONV_EXCL`), understanding this may affect other tooling behavior.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-02
Generated
2026-05-06
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
sensiolabs symfony to 5.4.51 (exc)
sensiolabs symfony From 6.4.0 (inc) to 6.4.33 (exc)
sensiolabs symfony From 7.3.0 (inc) to 7.3.11 (exc)
sensiolabs symfony From 7.4.0 (inc) to 7.4.5 (exc)
sensiolabs symfony From 8.0.0 (inc) to 8.0.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-88 The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the Symfony Process component on Windows when PHP is run from an MSYS2-based environment like Git Bash. The component did not correctly treat certain characters (notably '=') as special when escaping arguments. As a result, MSYS2's argument/path conversion can corrupt or truncate arguments passed to native Windows executables, causing the spawned process to receive altered arguments. This can lead to unintended operations, such as deleting broader directories than intended if file-management commands are invoked with paths containing '='.


How can this vulnerability impact me? :

If you use Symfony Process to spawn native Windows executables from an MSYS2-based shell and pass arguments containing '=' or similar characters, the arguments may be corrupted or truncated. This can cause commands like file deletions to operate on unintended paths, potentially deleting more data than intended. The risk is higher if untrusted input influences these arguments, leading to possible data loss or unintended system modifications.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, avoid running PHP or your own tooling from MSYS2-based shells on Windows; instead, use cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing '=' or similar MSYS2-sensitive characters to Symfony Process when operating under Git Bash/MSYS2. Additionally, where applicable, configure MSYS2 to disable or restrict argument conversion by setting the MSYS2_ARG_CONV_EXCL environment variable, understanding this may affect other tooling behavior. Also, update Symfony Process component to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, or 8.0.5 which contain patches for this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart