๐Ÿ” CVE Alert

CVE-2026-31819

UNKNOWN 0.0

Sylius has an Open Redirect via Referer Header

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Sylius is an Open Source eCommerce Framework on Symfony. CurrencySwitchController::switchAction(), ImpersonateUserController::impersonateAction() and StorageBasedLocaleSwitcher::handle() use the HTTP Referer header directly when redirecting. The attack requires the victim to click a legitimate application link placed on an attacker-controlled page. The browser automatically sends the attacker's site as the Referer, and the application redirects back to it. This can be used for phishing or credential theft, as the redirect originates from a trusted domain. The severity varies by endpoint; public endpoints require no authentication and are trivially exploitable, while admin-only endpoints require an authenticated session but remain vulnerable if an admin follows a link from an external source such as email or chat. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above.

CWE CWE-601
Vendor sylius
Product sylius
Published Mar 10, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for sylius sylius

Be the first to know when new unknown vulnerabilities affecting sylius sylius are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Sylius / Sylius
>= 2.2.0, < 2.2.3 >= 2.1.0, < 2.1.12 >= 2.0.0, < 2.0.16 >= 1.14.0, < 1.14.18 >= 1.13.0, < 1.13.15 >= 1.12.0, < 1.12.23 >= 1.11.0, < 1.11.17 >= 1.10.0, < 1.10.16 < 1.9.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Sylius/Sylius/security/advisories/GHSA-9ffx-f77r-756w