CVE-2024-35226

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35226
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35226.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35226
Aliases
Downstream
Published
2024-05-28T20:55:00Z
Modified
2025-10-30T20:26:36.287525Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
PHP Code Injection by malicious attribute in extends-tag in Smarty
Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/smarty-php/smarty

Affected ranges

Type
GIT
Repo
https://github.com/smarty-php/smarty
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.6.24
v2.6.25
v2.6.26
v2.6.27
v2.6.28

v3.*

v3.1.11
v3.1.12
v3.1.13
v3.1.14
v3.1.15
v3.1.16
v3.1.17
v3.1.18
v3.1.19
v3.1.20
v3.1.21
v3.1.23
v3.1.24
v3.1.25
v3.1.26
v3.1.27
v3.1.28
v3.1.29
v3.1.30
v3.1.31
v3.1.32
v3.1.33
v3.1.34
v3.1.35
v3.1.36
v3.1.37
v3.1.37.1
v3.1.38
v3.1.39
v3.1.40

v4.*

v4.0.0
v4.0.0-rc.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.1.0
v4.1.1
v4.2.0
v4.2.1
v4.3.0
v4.3.1
v4.3.2

v5.*

v5.0.0
v5.0.0-rc1
v5.0.0-rc2
v5.0.0-rc3
v5.1.0