CVE-2021-29454

Source
https://cve.org/CVERecord?id=CVE-2021-29454
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29454.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-29454
Aliases
Downstream
Related
Published
2022-01-10T20:15:08Z
Modified
2026-02-04T21:50:06.172668Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

References

Affected packages

Git / github.com/smarty-php/smarty

Affected ranges

Affected versions

v4.*
v4.0.0
v4.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29454.json"