UBUNTU-CVE-2018-25047

Source
https://ubuntu.com/security/CVE-2018-25047
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-25047.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-25047
Upstream
Downstream
Related
Published
2022-09-15T00:15:00Z
Modified
2025-07-18T16:44:52Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smartyfunctionmailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

References

Affected packages

Ubuntu:Pro:16.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.21-1ubuntu1+esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.21-1
3.1.21-1ubuntu1
3.1.21-1ubuntu1+esm1

Ubuntu:Pro:18.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1

Affected versions

3.*

3.1.31+20161214.1.c7d42e4+selfpack1-2
3.1.31+20161214.1.c7d42e4+selfpack1-3
3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1",
            "binary_name": "smarty3"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Ubuntu:20.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1

Affected versions

3.*

3.1.33+20180830.1.3a78a21f+selfpack1-1
3.1.34+20190228.1.c9f0de05+selfpack1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1",
            "binary_name": "smarty3"
        }
    ],
    "availability": "No subscription required"
}

Ubuntu:22.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.39-2ubuntu1.22.04.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.39-2ubuntu1.22.04.2

Affected versions

3.*

3.1.39-2
3.1.39-2ubuntu1
3.1.39-2ubuntu1.22.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1.39-2ubuntu1.22.04.2",
            "binary_name": "smarty3"
        }
    ],
    "availability": "No subscription required"
}

Ubuntu:24.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.48-1ubuntu0.24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.48-1ubuntu0.24.04.1

Affected versions

3.*

3.1.48-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1.48-1ubuntu0.24.04.1",
            "binary_name": "smarty3"
        }
    ],
    "availability": "No subscription required"
}

Ubuntu:25.04 / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3@3.1.48-2?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.48-1
3.1.48-2