Arbitrary Argument Injection Affecting symfony/process package, versions <5.4.51>=6.4.0-BETA1, <6.4.33>=7.3.0-BETA1, <7.3.11>=7.4.0-BETA1, <7.4.5>=8.0.0-BETA1, <8.0.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYPROCESS-15147051
  • published29 Jan 2026
  • disclosed28 Jan 2026
  • creditJordi Boggiano

Introduced: 28 Jan 2026

CVE-2026-24739  (opens in a new tab)
CWE-88  (opens in a new tab)

How to fix?

Upgrade symfony/process to version 5.4.51, 6.4.33, 7.3.11, 7.4.5, 8.0.5 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Argument Injection via incorrect argument escaping in the Process component when executed under MSYS2-based environments on Windows. An attacker can cause destructive file operations, such as unintended deletion of directories or drives, by influencing process arguments through untrusted input, including repository paths, extracted archive paths, temporary directories, or user-controlled configuration.

Workaround

This vulnerability can be mitigated by avoiding the use of MSYS2-based shells for running PHP or related tooling, preferring cmd.exe or PowerShell, avoiding passing paths with '=' or similar characters to process arguments, or configuring MSYS2 to disable or restrict argument conversion (e.g., via MSYS2_ARG_CONV_EXCL).

CVSS Base Scores

version 4.0
version 3.1