Smarty vulnerable to PHP Code Injection by malicious attribute in extends-tag
Package
Affected versions
>= 5.0.0, < 5.1.1
>= 3.0.0, < 4.5.3
Patched versions
5.1.1
4.5.3
Description
Published by the National Vulnerability Database
May 28, 2024
Published to the GitHub Advisory Database
May 29, 2024
Reviewed
May 29, 2024
Last updated
May 29, 2024
Impact
Template authors could inject php code by choosing a malicous file name for an extends-tag. Users that cannot fully trust template authors should update asap.
Patches
Please upgrade to the most recent version of Smarty v4 or v5. There is no patch for v3.
References