CVE-2017-1000480: Smarty PHP code injection
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.74799%
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
smarty/smarty | composer | >= 3, < 3.1.32 | 3.1.32 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly states that fetch()
and display()
are vulnerable when used with custom resources that lack template name sanitization. These functions are core Smarty methods responsible for rendering templates. The CWE-94 classification confirms code injection occurs via improper input control in template handling. Multiple advisories (GitHub, NVD, Debian) consistently reference these functions in the exploit context, and the patch in v3.1.32 would address their input validation logic for custom resources.