5.2.4
Release Notes for 5.2.4
Security Fix
-
Fixed origin validation bypass in
CheckAllowedOrigins(GHSA-f7pm-6hr8-7ggm, CWE-346, CVSS 5.4)When
allowed_originswas configured,CheckAllowedOriginsreduced URL origins to their host component only, ignoring scheme and port. This allowed a request from a different port (or scheme) to pass origin validation, violating the WebAuthn Level 2 spec requirement for exact origin matching.CheckAllowedOriginsnow performs full origin comparison (scheme + host + port) with default port normalization (443 for HTTPS, 80 for HTTP). Origins configured without a scheme are still matched by host only for backward compatibility.Reported by @dorakemon.
Upgrade
composer update web-auth/webauthn-framework
# or
composer update web-auth/webauthn-lib web-auth/webauthn-symfony-bundle