Smarty-Php Smarty vulnerabilities
5 known vulnerabilities affecting smarty-php/smarty.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2024-35226HIGHCVSS 7.3v>= 5.0.0, < 5.1.1v>= 3.0.0, < 4.5.32024-05-28
CVE-2024-35226 [HIGH] CWE-94 PHP Code Injection by malicious attribute in extends-tag in Smarty
PHP Code Injection by malicious attribute in extends-tag in Smarty
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There
cvelistv5
CVE-2023-28447MEDIUMCVSS 6.1v>= 4.0.0, < 4.3.1fixed in 3.1.482023-03-28
CVE-2023-28447 [MEDIUM] CWE-79 CVE-2023-28447: Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unautho
nvd
CVE-2022-29221HIGHCVSS 8.8fixed in 3.1.45v>= 4.0.0, < 4.1.12022-05-24
CVE-2022-29221 [HIGH] CWE-94 PHP Code Injection by malicious block or filename in Smarty
PHP Code Injection by malicious block or filename in Smarty
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to recei
cvelistv5
CVE-2021-29454HIGHCVSS 8.1fixed in 3.1.42v>= 4.0.0, < 4.0.22022-01-10
CVE-2021-29454 [HIGH] CWE-74 Sandbox Escape by math function in smarty
Sandbox Escape by math function in smarty
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious mat
cvelistv5
CVE-2021-21408HIGHCVSS 8.8fixed in 3.1.43v>= 4.0.0, < 4.0.32022-01-10
CVE-2021-21408 [HIGH] CWE-20 Access to restricted PHP code by dynamic static class access in smarty
Access to restricted PHP code by dynamic static class access in smarty
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.
cvelistv5