7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%
smarty/smarty is vulnerable to code injection. The vulnerability is due to insufficient validation of file names used in the extends-tag
. This allows attackers to inject PHP code by choosing a malicious file name for an extends-tag
.
CPE | Name | Operator | Version |
---|---|---|---|
smarty/smarty | le | v4.5.2 | |
smarty/smarty | le | v5.0.2 | |
smarty/smarty | le | v4.5.2 | |
smarty/smarty | le | v5.0.2 |
7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%