Lucene search

K
githubGitHub Advisory DatabaseGHSA-2PMX-6MM6-6V72
HistoryMay 17, 2022 - 1:13 a.m.

Smarty arbitrary PHP code execution

2022-05-1701:13:38
CWE-94
GitHub Advisory Database
github.com
2

7.6 High

AI Score

Confidence

Low

0.058 Low

EPSS

Percentile

93.4%

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by “{literal}<{/literal}script language=php>” in a template.

CPENameOperatorVersion
smarty/smartylt3.1.21

7.6 High

AI Score

Confidence

Low

0.058 Low

EPSS

Percentile

93.4%