CVE-2024-51754

Source
https://cve.org/CVERecord?id=CVE-2024-51754
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-51754.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-51754
Aliases
Downstream
Published
2024-11-06T19:28:17.553Z
Modified
2026-04-15T04:48:21.717786Z
Severity
  • 2.2 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Unguarded calls to __toString() when nesting an object into an array in Twig
Details

Twig is a template language for PHP. In a sandbox, an attacker can call __toString() on an object even if the __toString() method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51754.json",
    "cwe_ids": [
        "CWE-668"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/twigphp/twig

Affected ranges

Type
GIT
Repo
https://github.com/twigphp/twig
Events

Affected versions

v3.*
v3.12.0
v3.13.0
v3.14.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-51754.json"