Skip to content

Apply security fixed and fix build#1423

Merged
johanib merged 3 commits intomainfrom
feature/security-patches
Feb 16, 2026
Merged

Apply security fixed and fix build#1423
johanib merged 3 commits intomainfrom
feature/security-patches

Conversation

@johanib
Copy link
Contributor

@johanib johanib commented Feb 11, 2026

Prior to this change, both composer audit and yarn audit would have some security issues.
In order to keep things managable, I fixed these issues by doing some lockfile maintenance. package.json required some build-time dependencies to be resolutioned.

Also remove the failing tinymce patch, it's no longer needed.

See #1422

Update: Resolving the yarn issues caused regression. Rolled back for now. Will be separate PR.

+-------------------+----------------------------------------------------------------------------------+
| Package           | phpunit/phpunit                                                                  |
| Severity          | high                                                                             |
| CVE               | CVE-2026-24765                                                                   |
| Title             | PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling      |
| URL               | GHSA-vvj3-c3rp-c85p                                |
| Affected versions | >=12.0.0,<12.5.8|>=11.0.0,<11.5.50|>=10.0.0,<10.5.62|>=9.0.0,<9.6.33|<8.5.52     |
| Reported at       | 2026-01-27T22:26:22+00:00                                                        |
+-------------------+----------------------------------------------------------------------------------+
+-------------------+----------------------------------------------------------------------------------+
| Package           | robrichards/xmlseclibs                                                           |
| Severity          | medium                                                                           |
| CVE               | CVE-2025-66578                                                                   |
| Title             | robrichards/xmlseclibs has an Libxml2 Canonicalization error which can bypass    |
|                   | Digest/Signature validation                                                      |
| URL               | GHSA-c4cc-x928-vjw9                                |
| Affected versions | <=3.1.3                                                                          |
| Reported at       | 2025-12-08T17:57:33+00:00                                                        |
+-------------------+----------------------------------------------------------------------------------+
+-------------------+----------------------------------------------------------------------------------+
| Package           | symfony/http-foundation                                                          |
| Severity          | high                                                                             |
| CVE               | CVE-2025-64500                                                                   |
| Title             | CVE-2025-64500: Incorrect parsing of PATH_INFO can lead to limited authorization |
|                   | bypass                                                                           |
| URL               | https://symfony.com/blog/cve-2025-64500-incorrect-parsing-of-path-info-can-lead- |
|                   | to-limited-authorization-bypass                                                  |
| Affected versions | >=2.0.0,<3.0.0|>=3.0.0,<4.0.0|>=4.0.0,<5.0.0|>=5.0.0,<5.1.0|>=5.1.0,<5.2.0|>=5.2 |
|                   | .0,<5.3.0|>=5.3.0,<5.4.0|>=5.4.0,<5.4.50|>=6.0.0,<6.1.0|>=6.1.0,<6.2.0|>=6.2.0,< |
|                   | 6.3.0|>=6.3.0,<6.4.0|>=6.4.0,<6.4.29|>=7.0.0,<7.1.0|>=7.1.0,<7.2.0|>=7.2.0,<7.3. |
|                   | 0|>=7.3.0,<7.3.7                                                                 |
| Reported at       | 2025-11-12T11:09:14+00:00                                                        |
+-------------------+----------------------------------------------------------------------------------+
+-------------------+----------------------------------------------------------------------------------+
| Package           | symfony/process                                                                  |
| Severity          | medium                                                                           |
| CVE               | CVE-2026-24739                                                                   |
| Title             | Symfony's incorrect argument escaping under MSYS2/Git Bash can lead to           |
|                   | destructive file operations on Windows                                           |
| URL               | GHSA-r39x-jcww-82v6                                |
| Affected versions | >=8.0,<8.0.5|>=7.4,<7.4.5|>=7.3,<7.3.11|>=6.4,<6.4.33|<5.4.51                    |
| Reported at       | 2026-01-28T21:28:10+00:00                                                        |
+-------------------+----------------------------------------------------------------------------------+
Prior to this change, composer install failed to apply the tinymce patch.
In the past, we needed to patch tinyMce to use autoloading.
This is no longer needed, and the patch failed to apply also.

See #1422
Prior to this change, the webtests would fail. This happened, because EB now shows the wayf, as multiple IdPs are presented. This happened because of the 'discovery IdP' feature that was added to EB 6.18.
In ordor to handle that, the tests are now compatible with that.

See #1422
See OpenConext/OpenConext-engineblock#1338
@johanib johanib force-pushed the feature/security-patches branch from c485f82 to f54c208 Compare February 12, 2026 10:48
@johanib johanib requested a review from MKodde February 16, 2026 07:45
@johanib johanib merged commit 21f7c0e into main Feb 16, 2026
2 checks passed
@johanib johanib linked an issue Feb 16, 2026 that may be closed by this pull request
4 tasks
@johanib johanib deleted the feature/security-patches branch February 17, 2026 09:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6.3 release preparation

2 participants