First published: Wed Sep 14 2022(Updated: )
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.1.47>=4.0.0<4.2.1 | |
debian/smarty3 | <=3.1.39-2+deb11u1 | 3.1.39-2+deb11u2 3.1.47-2+deb12u1 3.1.48-2 |
debian/smarty4 | 4.3.0-1+deb12u2 4.5.4-1 | |
Smarty | <3.1.47 | |
Smarty | >=4.0.0<4.2.1 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-25047 is considered to have a high severity due to its potential for allowing cross-site scripting (XSS) attacks.
To fix CVE-2018-25047, upgrade Smarty to version 3.1.48 or 4.2.1 or later.
CVE-2018-25047 affects Smarty versions prior to 3.1.48 and versions between 4.0.0 and 4.2.1.
CVE-2018-25047 can facilitate cross-site scripting (XSS) attacks by allowing the injection of JavaScript code.
Vulnerable software packages include specified versions of Smarty 3.x and 4.x, particularly under Debian systems.