CVE-2025-47946: Symfony UX allows unsanitized HTML attribute injection via ComponentAttributes
(updated )
Rendering {{ attributes }} or using any method that returns a ComponentAttributes instance (e.g. only(), defaults(), without()) ouputs attribute values directly without escaping. If these values are unsafe (e.g. contain user input), this can lead to HTML attribute injection and XSS vulnerabilities.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/ux-live-component/CVE-2025-47946.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/ux-twig-component/CVE-2025-47946.yaml
- github.com/advisories/GHSA-5j3w-5pcr-f8hg
- github.com/symfony/ux
- github.com/symfony/ux-live-component/commit/7ad44cf56d750b9f56658ed986286a10da132ee7
- github.com/symfony/ux-twig-component/commit/b5d4e77db69315aeb18d2238e0e7c943d340ce76
- github.com/symfony/ux/commit/b5d1c85995c128cb926d47a96cfbfbd500b643a8
- github.com/symfony/ux/commit/c2f7738ee0969c31df7514025a7f5fc6e153932d
- github.com/symfony/ux/security/advisories/GHSA-5j3w-5pcr-f8hg
- nvd.nist.gov/vuln/detail/CVE-2025-47946
- symfony.com/blog/symfony-ux-cve-2025-47946-unsanitized-html-attribute-injection-via-componentattributes
Code Behaviors & Features
Detect and mitigate CVE-2025-47946 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →