CVE-2024-35226

HIGH

Smarty < 5.1.1 - Code Injection

Title source: rule
STIX 2.1

Description

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

Scores

CVSS v3 7.3
EPSS 0.0028
EPSS Percentile 51.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-94
Status published
Products (3)
smarty/smarty 5.0.0 - 5.1.1Packagist
smarty-php/smarty >= 3.0.0, < 4.5.3
smarty-php/smarty >= 5.0.0, < 5.1.1
Published May 28, 2024
Tracked Since Feb 18, 2026