Description
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/security/advisories/GHSA-4rmg-292m-wg3w
Scores
CVSS v3
7.3
EPSS
0.0028
EPSS Percentile
51.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (3)
smarty/smarty
5.0.0 - 5.1.1Packagist
smarty-php/smarty
>= 3.0.0, < 4.5.3
smarty-php/smarty
>= 5.0.0, < 5.1.1
Published
May 28, 2024
Tracked Since
Feb 18, 2026