Cross site scripting vulnerability in Javascript escaping in smarty/smarty
CVE-2023-28447
Key Information:
- Vendor
- Smarty-PHP
- Status
- Vendor
- CVE Published:
- 28 March 2023
Badges
Summary
The Smarty template engine for PHP has a vulnerability that allows an attacker to inject and execute arbitrary JavaScript code due to improper escaping. This leads to potential unauthorized access to sensitive user information and manipulation of the application's operations within the user's browser context. To mitigate this risk, users are strongly advised to upgrade to Smarty version 3.1.48 or 4.3.1, as there are no known workarounds available.
Affected Version(s)
smarty >= 4.0.0, < 4.3.1 < 4.0.0, 4.3.1
smarty < 3.1.48 < 3.1.48
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved