CVE-2023-28447Cross-site Scripting in Smarty

Severity
6.1MEDIUMNVD
OSV8.8OSV5.4
EPSS
0.7%
top 27.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 28
Latest updateDec 12

Description

Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are n

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages6 packages

NVDsmarty/smarty4.0.04.3.1+1
Packagistsmarty/smarty4.0.04.3.1+1
debiandebian/smarty3< smarty3 3.1.47-2+deb12u1 (bookworm)
debiandebian/smarty4< smarty3 3.1.47-2+deb12u1 (bookworm)
CVEListV5smarty-php/smarty< 3.1.48+1

Also affects: Fedora 36, 37, 38

Patches

🔴Vulnerability Details

5
OSV
smarty3 vulnerabilities2024-12-12
OSV
postfixadmin vulnerabilities2023-12-12
GHSA
smarty Cross-site Scripting vulnerability in Javascript escaping2023-03-29
OSV
smarty Cross-site Scripting vulnerability in Javascript escaping2023-03-29
OSV
CVE-2023-28447: Smarty is a template engine for PHP2023-03-28

📋Vendor Advisories

3
Ubuntu
Smarty vulnerabilities2024-12-12
Ubuntu
PostfixAdmin vulnerabilities2023-12-12
Debian
CVE-2023-28447: smarty3 - Smarty is a template engine for PHP. In affected versions smarty did not properl...2023