Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
{
"nvd_published_at": "2018-09-11T13:29:00Z",
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed_at": "2023-07-25T19:37:36Z",
"github_reviewed": true
}