Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-4811

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-31 Oct, 2008 | 17:18
Updated At-07 Aug, 2024 | 10:31
Rejected At-
Credits

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:31 Oct, 2008 | 17:18
Updated At:07 Aug, 2024 | 10:31
Rejected At:
â–¼CVE Numbering Authority (CNA)

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/32329
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
vdb-entry
x_refsource_XF
http://www.securityfocus.com/bid/31862
vdb-entry
x_refsource_BID
http://www.debian.org/security/2008/dsa-1691
vendor-advisory
x_refsource_DEBIAN
http://securityvulns.ru/Udocument746.html
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2008/10/25/2
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/32329
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/bid/31862
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.debian.org/security/2008/dsa-1691
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://securityvulns.ru/Udocument746.html
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/25/2
Resource:
mailing-list
x_refsource_MLIST
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/32329
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/bid/31862
vdb-entry
x_refsource_BID
x_transferred
http://www.debian.org/security/2008/dsa-1691
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://securityvulns.ru/Udocument746.html
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2008/10/25/2
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/32329
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/bid/31862
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1691
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://securityvulns.ru/Udocument746.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/25/2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:31 Oct, 2008 | 18:09
Updated At:23 Apr, 2026 | 00:35

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

smarty
smarty
>>smarty>>Versions up to 2.6.20(inclusive)
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.0
cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.0a
cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.0b
cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.1.0
cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.2.0
cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.2.1
cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.2.2
cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.3.0
cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.3.1
cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.3.2
cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.0
cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.0
cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.0
cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.1
cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.2
cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.3
cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.4
cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.5
cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.4.6
cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.5.0
cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.5.1
cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>1.5.2
cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.0.0
cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.0.1
cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.1.0
cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.1.1
cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.2.0
cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.3.0
cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.3.1
cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.4.0
cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.4.1
cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.4.2
cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.5.0
cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.5.0
cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.5.0
cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.0
cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.0
cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.0
cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.0
cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.1
cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.2
cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.3
cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.4
cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.5
cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.6
cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.7
cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.9
cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.10
cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*
smarty
smarty
>>smarty>>2.6.11
cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/32329cve@mitre.org
Vendor Advisory
http://securityvulns.ru/Udocument746.htmlcve@mitre.org
N/A
http://www.debian.org/security/2008/dsa-1691cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2008/10/25/2cve@mitre.org
N/A
http://www.securityfocus.com/bid/31862cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406cve@mitre.org
N/A
http://secunia.com/advisories/32329af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityvulns.ru/Udocument746.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2008/dsa-1691af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2008/10/25/2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/31862af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/32329
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://securityvulns.ru/Udocument746.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1691
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/25/2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/31862
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/32329
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://securityvulns.ru/Udocument746.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1691
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/10/25/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/31862
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46406
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

11Records found

CVE-2006-7193
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.27% / 79.62%
||
7 Day CHG+0.23%
Published-12 Apr, 2007 | 19:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CVE-2006-7105
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.15% / 78.64%
||
7 Day CHG~0.00%
Published-03 Mar, 2007 | 21:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-5054
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-03 Feb, 2011 | 16:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CVE-2009-5053
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.46% / 64.19%
||
7 Day CHG~0.00%
Published-03 Feb, 2011 | 16:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CVE-2008-4810
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.41% / 80.61%
||
7 Day CHG~0.00%
Published-31 Oct, 2008 | 17:18
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-1000480
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.64% / 70.56%
||
7 Day CHG~0.00%
Published-03 Jan, 2018 | 18:00
Updated-05 Aug, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2005-0913
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.90% / 75.83%
||
7 Day CHG~0.00%
Published-29 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CVE-2014-8350
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.80%
||
7 Day CHG~0.00%
Published-03 Nov, 2014 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-26120
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-75.58% / 98.92%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 01:38
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.

Action-Not Available
Vendor-smartyn/aDebian GNU/Linux
Product-smartydebian_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-1066
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.50% / 81.23%
||
7 Day CHG~0.00%
Published-28 Feb, 2008 | 20:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

Action-Not Available
Vendor-smartyn/a
Product-smartyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-1028
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 66.79%
||
7 Day CHG~0.00%
Published-20 Nov, 2019 | 14:45
Updated-06 Aug, 2024 | 22:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.

Action-Not Available
Vendor-smartysmarty3Debian GNU/Linux
Product-smartydebian_linuxsmarty3
CWE ID-CWE-20
Improper Input Validation
Details not found