{"id":"CVE-2018-25047","details":"In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.","aliases":["GHSA-hwq7-5vv9-c6cf"],"modified":"2026-04-16T04:44:41.600728563Z","published":"2022-09-15T00:15:09.580Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00013.html"},{"type":"ADVISORY","url":"https://github.com/smarty-php/smarty/releases/tag/v3.1.47"},{"type":"ADVISORY","url":"https://github.com/smarty-php/smarty/releases/tag/v4.2.1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202209-09"},{"type":"REPORT","url":"https://bugs.gentoo.org/870100"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/issues/454"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"fixed":"a09364fe1706cb465e910eb040e592053d7effb8"},{"introduced":"baebd59bb4da9fca89da382811b38c8313949c49"},{"fixed":"ffa2b81a8e354a49fd8a2f24742dc9dc399e8007"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.47"},{"introduced":"4.0.0"},{"fixed":"4.2.1"}]}}],"versions":["v2.6.24","v2.6.25","v2.6.26","v2.6.27","v2.6.28","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.20","v3.1.21","v3.1.23","v3.1.24","v3.1.25","v3.1.26","v3.1.27","v3.1.28","v3.1.29","v3.1.30","v3.1.31","v3.1.32","v3.1.33","v3.1.34","v3.1.35","v3.1.36","v3.1.37","v3.1.37.1","v3.1.38","v3.1.39","v3.1.40","v3.1.41","v3.1.42","v3.1.43","v3.1.44","v3.1.45","v3.1.46","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.1.0","v4.1.1","v4.2.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-25047.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}