{"id":"CVE-2023-41336","summary":"Prevent injection of invalid entity ids for \"autocomplete\" fields in symfony ux-autocomplete","details":"ux-autocomplete is a JavaScript Autocomplete functionality for Symfony. Under certain circumstances, an attacker could successfully submit an entity id for an `EntityType` that is *not* part of the valid choices. The problem has been fixed in `symfony/ux-autocomplete` version 2.11.2.","aliases":["GHSA-4cpv-669c-r79x"],"modified":"2026-04-29T04:10:28.012464Z","published":"2023-09-11T19:21:48.938Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/41xxx/CVE-2023-41336.json","cwe_ids":["CWE-20"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/41xxx/CVE-2023-41336.json"},{"type":"ADVISORY","url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/ux-autocomplete/CVE-2023-41336.yaml"},{"type":"ADVISORY","url":"https://github.com/symfony/ux-autocomplete/security/advisories/GHSA-4cpv-669c-r79x"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41336"},{"type":"FIX","url":"https://github.com/symfony/ux-autocomplete/commit/fabcb2eee14b9e84a45b276711853a560b5d770c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/ux-autocomplete","events":[{"introduced":"0"},{"fixed":"fabcb2eee14b9e84a45b276711853a560b5d770c"}]}],"versions":["v2.10.0","v2.11.0","v2.11.1","v2.2.0","v2.3.0","v2.5.0","v2.6.0","v2.6.1","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.9.0","v2.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-41336.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}