{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "3.3.6"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "6f80cbd2dd89c5308b14e03d806356fac72c263e"
            }
          ],
          "repo": "https://github.com/symfony/symfony",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "Reflected Cross-site scripting (XSS) vulnerability in the web profiler in SensioLabs Symfony 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the \"file\" parameter, aka an _profiler/open?file= URI.  NOTE: The vendor states \"The XSS ... is in the web profiler, a tool that should never be deployed in production (so, we don't handle those issues as security issues).",
  "id": "CVE-2018-12040",
  "modified": "2026-03-13T21:50:13.697586683Z",
  "published": "2018-06-13T22:29:00.550Z",
  "references": [
    {
      "type": "EVIDENCE",
      "url": "http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-Scripting.html"
    },
    {
      "type": "EVIDENCE",
      "url": "http://www.securityfocus.com/archive/1/542071/100/0/threaded"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}