CVE-2014-5245
Published:May 14, 2026
Updated:May 14, 2026
All 2.2.X, 2.3.X, 2.4.X, and 2.5.X versions of the Symfony HttpKernel component are affected by this security issue. Your application is vulnerable only if the ESI feature is enabled and there is a proxy in front of the web application. This issue has been fixed in Symfony 2.3.19, 2.4.9, and 2.5.4. Note that no fixes are provided for Symfony 2.2 as it is not maintained anymore. Description When you enable the ESI feature and when you are using a proxy like Varnish that you configured as a trusted proxy, the "FragmentHandler" considered requests to render fragments as coming from a trusted source, even if the client was requesting them directly. Symfony can not distinguish between ESI requests done on behalf of the client by Varnish and faked fragment requests coming directly from the client. To mitigate this issue, and for not-supported Symfony versions, you can use the following workaround in your Varnish configuration ("/_fragment" being the URL path prefix configured under the "fragment" setting of the framework bundle configuration): Copy sub vcl_recv { if (req.restarts == 0 && req.url ~ "^/_fragment") { error 400; } } Resolution We do not rely on trusted IPs anymore when validating a fragment request as all fragment URLs are now signed. The patch for this issue is available here: https://github.com/symfony/symfony/pull/11831
Affected Packages
symfony/symfony (PHP):
Affected version(s) >=v2.0.0 <v2.3.19Fix Suggestion:
Update to version v2.3.19symfony/http-kernel (PHP):
Affected version(s) >=v2.5.0 <v2.5.4Fix Suggestion:
Update to version v2.5.4symfony/http-kernel (PHP):
Affected version(s) >=v2.4.0 <v2.4.9Fix Suggestion:
Update to version v2.4.9symfony/symfony (PHP):
Affected version(s) >=v2.4.0 <v2.4.9Fix Suggestion:
Update to version v2.4.9symfony/http-kernel (PHP):
Affected version(s) >=v2.0.0 <v2.3.19Fix Suggestion:
Update to version v2.3.19symfony/symfony (PHP):
Affected version(s) >=v2.5.0 <v2.5.4Fix Suggestion:
Update to version v2.5.4Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor