CVE-2024-35226

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35226
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35226.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35226
Aliases
Downstream
Related
Published
2024-05-28T21:16:30Z
Modified
2025-09-19T15:02:57.016915Z
Summary
[none]
Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/smarty-php/smarty

Affected ranges

Type
GIT
Repo
https://github.com/smarty-php/smarty
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.6.24
v2.6.25
v2.6.26
v2.6.27
v2.6.28

v3.*

v3.1.11
v3.1.12
v3.1.13
v3.1.14
v3.1.15
v3.1.16
v3.1.17
v3.1.18
v3.1.19
v3.1.20
v3.1.21
v3.1.23
v3.1.24
v3.1.25
v3.1.26
v3.1.27
v3.1.28
v3.1.29
v3.1.30
v3.1.31
v3.1.32
v3.1.33
v3.1.34
v3.1.35
v3.1.36
v3.1.37
v3.1.37.1
v3.1.38
v3.1.39
v3.1.40

v4.*

v4.0.0
v4.0.0-rc.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.1.0
v4.1.1
v4.2.0
v4.2.1
v4.3.0
v4.3.1
v4.3.2

v5.*

v5.0.0
v5.0.0-rc1
v5.0.0-rc2
v5.0.0-rc3
v5.1.0