Parameters YML Configuration Detected

high Web App Scanning Plugin ID 115125

Synopsis

Parameters YML Configuration Detected

Description

`parameters.yml` is a configuration file commonly used in Symfony-based web applications to store various settings, including database credentials, API keys, and other sensitive information.

This plugin checks for the presence of the `parameters.yml` file in web applications. If this file is publicly accessible, it can lead to the exposure of sensitive information that could be exploited by attackers.

Solution

Ensure that the `parameters.yml` configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.

Plugin Details

Severity: High

ID: 115125

Type: remote

Published: 1/30/2026

Updated: 1/30/2026

Scan Template: api, basic, full, pci, scan

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: High

Base Score: 8.7

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information