{"id":"CVE-2017-1000480","details":"Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.","aliases":["GHSA-9m49-vhwv-422g"],"modified":"2026-04-16T06:26:29.640387652Z","published":"2018-01-03T18:29:00.370Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"},{"type":"ADVISORY","url":"https://github.com/smarty-php/smarty/blob/master/change_log.txt"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4094"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"fixed":"ac9d4b587e5bf53381e21881820a9830765cb459"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"3.1.32"}]}}],"versions":["v2.6.24","v2.6.25","v2.6.26","v2.6.27","v2.6.28","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.20","v3.1.21","v3.1.23","v3.1.24","v3.1.25","v3.1.26","v3.1.27","v3.1.28","v3.1.29","v3.1.30","v3.1.31"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-1000480.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}