First published: Tue May 28 2024(Updated: )
### Impact Template authors could inject php code by choosing a malicous file name for an extends-tag. Users that cannot fully trust template authors should update asap. ### Patches Please upgrade to the most recent version of Smarty v4 or v5. There is no patch for v3.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | >=3.0.0<4.5.3 | 4.5.3 |
composer/smarty/smarty | >=5.0.0<5.1.1 | 5.1.1 |
debian/smarty3 | <=3.1.39-2+deb11u1 | 3.1.39-2+deb11u2 3.1.47-2+deb12u1 3.1.48-2 |
debian/smarty4 | 4.3.0-1+deb12u2 4.5.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35226 has a critical severity due to the potential for PHP code injection by untrusted template authors.
To fix CVE-2024-35226, upgrade to the latest version of Smarty, specifically version 4.5.3 or 5.1.1, as there is no patch for v3.
Affected versions of Smarty include versions 3.0.0 to 4.5.2 and 5.0.0 to 5.1.0.
Failing to remediate CVE-2024-35226 may lead to unauthorized PHP code execution, compromising the security of your applications.
CVE-2024-35226 impacts the Smarty PHP template engine, particularly versions provided through Composer and Debian packages.