VYPR
Moderate severityOSV Advisory· Published Jan 28, 2026· Updated Jan 29, 2026

Symfony has incorrect argument escaping under MSYS2/Git Bash on Windows that can lead to destructive file operations

CVE-2026-24739

Description

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably =) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. rmdir, del, etc.) with a path argument containing =, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents of a broader directory or drive. The issue is particularly relevant when untrusted input can influence process arguments (directly or indirectly, e.g. via repository paths, extracted archive paths, temporary directories, or user-controlled configuration). Versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5 contains a patch for the issue. Some workarounds are available. Avoid running PHP/one's own tooling from MSYS2-based shells on Windows; prefer cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing = (and similar MSYS2-sensitive characters) to Symfony Process when operating under Git Bash/MSYS2. Where applicable, configure MSYS2 to disable or restrict argument conversion (e.g. via MSYS2_ARG_CONV_EXCL), understanding this may affect other tooling behavior.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
symfony/processPackagist
< 5.4.515.4.51
symfony/processPackagist
>= 6.4, < 6.4.336.4.33
symfony/processPackagist
>= 7.3, < 7.3.117.3.11
symfony/processPackagist
>= 7.4, < 7.4.57.4.5
symfony/processPackagist
>= 8.0, < 8.0.58.0.5
symfony/symfonyPackagist
< 5.4.515.4.51
symfony/symfonyPackagist
>= 6.4, < 6.4.336.4.33
symfony/symfonyPackagist
>= 7.3, < 7.3.117.3.11
symfony/symfonyPackagist
>= 7.4, < 7.4.57.4.5
symfony/symfonyPackagist
>= 8.0, < 8.0.58.0.5

Affected products

1

Patches

2
35203939050e

bug #63164 [Process] Fix escaping for MSYS on Windows (nicolas-grekas)

https://github.com/symfony/symfonyNicolas GrekasJan 26, 2026via ghsa
2 files changed · +21 1
  • src/Symfony/Component/Process/Process.php+1 1 modified
    @@ -1579,7 +1579,7 @@ private function escapeArgument(?string $argument): string
             if (str_contains($argument, "\0")) {
                 $argument = str_replace("\0", '?', $argument);
             }
    -        if (!preg_match('/[()%!^"<>&|\s]/', $argument)) {
    +        if (!preg_match('/[()%!^"<>&|\s[\]=;*?\'$]/', $argument)) {
                 return $argument;
             }
             $argument = preg_replace('/(\\\\+)$/', '$1$1', $argument);
    
  • src/Symfony/Component/Process/Tests/ProcessTest.php+20 0 modified
    @@ -1514,6 +1514,26 @@ public static function provideEscapeArgument()
             yield [1.1];
         }
     
    +    public function testMsysEscapingOnWindows()
    +    {
    +        if ('\\' !== \DIRECTORY_SEPARATOR) {
    +            $this->markTestSkipped('This test is for Windows platform only');
    +        }
    +
    +        file_put_contents('=foo.txt', 'This is a test file.');
    +
    +        try {
    +            $p = $this->getProcess(['type', substr_replace(getcwd(), '=foo.txt', 2)]);
    +            $p->mustRun();
    +
    +            $this->assertSame('This is a test file.', $p->getOutput());
    +        } finally {
    +            unlink('=foo.txt');
    +        }
    +
    +        $this->assertSame(\sprintf('type "%s=foo.txt"', substr(getcwd(), 0, 2)), $p->getCommandLine());
    +    }
    +
         public function testPreparedCommand()
         {
             $p = Process::fromShellCommandline('echo "${:abc}"DEF');
    
ec154f6f95f8

[Process] Fix escaping for MSYS on Windows

https://github.com/symfony/symfonyNicolas GrekasJan 23, 2026via ghsa
2 files changed · +21 1
  • src/Symfony/Component/Process/Process.php+1 1 modified
    @@ -1645,7 +1645,7 @@ private function escapeArgument(?string $argument): string
             if (str_contains($argument, "\0")) {
                 $argument = str_replace("\0", '?', $argument);
             }
    -        if (!preg_match('/[()%!^"<>&|\s]/', $argument)) {
    +        if (!preg_match('/[()%!^"<>&|\s[\]=;*?\'$]/', $argument)) {
                 return $argument;
             }
             $argument = preg_replace('/(\\\\+)$/', '$1$1', $argument);
    
  • src/Symfony/Component/Process/Tests/ProcessTest.php+20 0 modified
    @@ -1467,6 +1467,26 @@ public static function provideEscapeArgument()
             yield [1.1];
         }
     
    +    public function testMsysEscapingOnWindows()
    +    {
    +        if ('\\' !== \DIRECTORY_SEPARATOR) {
    +            $this->markTestSkipped('This test is for Windows platform only');
    +        }
    +
    +        file_put_contents('=foo.txt', 'This is a test file.');
    +
    +        try {
    +            $p = $this->getProcess(['type', substr_replace(getcwd(), '=foo.txt', 2)]);
    +            $p->mustRun();
    +
    +            $this->assertSame('This is a test file.', $p->getOutput());
    +        } finally {
    +            unlink('=foo.txt');
    +        }
    +
    +        $this->assertSame(\sprintf('type "%s=foo.txt"', substr(getcwd(), 0, 2)), $p->getCommandLine());
    +    }
    +
         public function testPreparedCommand()
         {
             $p = Process::fromShellCommandline('echo "${:abc}"DEF');
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.