Skip to content

Commit 2953ab4

Browse files
authored
[UPMERGE] 1.0 -> 1.1 (#412)
This PR has been generated automatically. For more details see [upmerge_pr.yaml](/Sylius/InvoicingPlugin/blob/1.0/.github/workflows/upmerge_pr.yaml). **Remember!** The upmerge should always be merged with using `Merge pull request` button. In case of conflicts, please resolve them manually with usign the following commands: ``` git fetch upstream gh pr checkout <this-pr-number> git merge upstream/1.1 -m "Resolve conflicts between 1.0 and 1.1" ``` If you use other name for the upstream remote, please replace `upstream` with the name of your remote pointing to the `Sylius/InvoicingPlugin` repository. Once the conflicts are resolved, please run `git merge --continue` and push the changes to this PR.
2 parents 776cd32 + e96d57b commit 2953ab4

File tree

3 files changed

+32
-1
lines changed

3 files changed

+32
-1
lines changed

.github/workflows/build.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ jobs:
197197

198198
-
199199
name: Run security check
200-
run: symfony security:check
200+
run: composer audit --abandoned=ignore
201201

202202
-
203203
name: Run PHPStan

AUDIT-IGNORE.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
# AUDIT-IGNORE
2+
3+
This document explains why specific advisories are added to `composer.json``config.audit.ignore`.
4+
5+
**PKSA-gs8r-6kz6-pp56**`api-platform/core` CVE-2025-31485; affected versions < 3.4.17, 4.0.0–4.0.21, 4.1.0–4.1.4 are pulled by Sylius dependency constraints. GraphQL property security grant caching issue allows unauthorized access.
6+
https://www.cve.org/CVERecord?id=CVE-2025-31485
7+
8+
**PKSA-gnn4-pxdg-q76m**`api-platform/core` CVE-2025-31481; same affected versions as above. GraphQL security bypass via Relay `node` type allows unauthorized entity access.
9+
https://www.cve.org/CVERecord?id=CVE-2025-31481
10+
11+
**PKSA-yhcn-xrg3-68b1**`twig/twig` CVE-2024-45411; affected versions < 1.44.8, < 2.16.1, < 3.14.0 are pulled by Sylius dependency constraints. Sandbox security checks can be bypassed when templates are loaded in non-sandbox context before include().
12+
https://www.cve.org/CVERecord?id=CVE-2024-45411
13+
14+
**PKSA-2wrf-1xmk-1pky**`twig/twig` CVE-2024-51755; affected versions < 3.11.2 or 3.12.0–3.14.0 are pulled by Sylius dependency constraints. Unguarded `__isset()` and array-access in sandbox allows attribute access on Array-like objects.
15+
https://www.cve.org/CVERecord?id=CVE-2024-51755
16+
17+
**PKSA-365x-2zjk-pt47**`symfony/http-foundation` CVE-2025-64500; affected versions < 5.4.50, < 6.4.29, < 7.3.7 are pulled by Sylius dependency constraints. Incorrect parsing of PATH_INFO can lead to limited authorization bypass.
18+
https://www.cve.org/CVERecord?id=CVE-2025-64500
19+
20+
**PKSA-4g5g-4rkv-myqs**`enshrined/svg-sanitize` CVE-2025-55166; affected versions < 0.22.0 are pulled by Sylius 1.13.x dependency constraints (requires ^0.16). Attribute sanitization bypass allowing XSS via mixed-case attributes. Fixed in Sylius 1.14 by removing the dependency entirely.
21+
https://www.cve.org/CVERecord?id=CVE-2025-55166

composer.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,16 @@
8080
"symfony/flex": true,
8181
"symfony/runtime": false,
8282
"symfony/thanks": false
83+
},
84+
"audit": {
85+
"ignore": [
86+
"PKSA-gs8r-6kz6-pp56",
87+
"PKSA-gnn4-pxdg-q76m",
88+
"PKSA-yhcn-xrg3-68b1",
89+
"PKSA-2wrf-1xmk-1pky",
90+
"PKSA-365x-2zjk-pt47",
91+
"PKSA-4g5g-4rkv-myqs"
92+
]
8393
}
8494
},
8595
"extra": {

0 commit comments

Comments
 (0)