CVE-2021-46433:
Sandbox bypass in fenom
10
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
-
Published
3/29/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
fenom/fenom | composer | <= 2.12.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies getTemplateCode() in Template.php as the location of the sandbox bypass. The function's role in template compilation suggests it handles code generation/execution. When 'disable_native_funcs' is true, the function likely fails to properly sanitize or restrict dynamic code evaluation, allowing PHP injection despite the security setting. High confidence comes from direct attribution in CVE/GHSA descriptions and the function's inherent responsibility for template code processing.