Fix CVE-2021-41196 in Monolog HIGH

Fix CVE-2021-41196 (log injection via headers) in Monolog for PHP. Paste your composer.json into PackageFix and get a patched version back — no CLI, no signup.

⚠ Vulnerability

CVE-2021-41196 — log injection via headers in Monolog. Update to ^3.5 or later.

Vulnerable Version — composer.json

"monolog/monolog": "^2.0"

Fixed Version — composer.json

"monolog/monolog": "^3.5"
✓ Fix

Update to ^3.5 and run composer install to apply the fix.

Scan your dependencies now — paste your manifest, get a fixed version back in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

Frequently Asked Questions

What is CVE-2021-41196?
CVE-2021-41196 is a vulnerability in Monolog that allows log injection via headers. Update to version ^3.5 or later to fix it.
Is CVE-2021-41196 on the CISA KEV catalog?
Check the live CISA KEV catalog at packagefix.dev — the catalog updates daily and PackageFix always reflects the current status.
How do I fix CVE-2021-41196 in Monolog?
Update Monolog to version ^3.5 or later in your composer.json. Run composer install after updating.
Does CVE-2021-41196 affect all versions of Monolog?
Check the OSV advisory for the exact affected version range. PackageFix shows the minimum safe version for your installed version.