{"id":"CVE-2021-26119","details":"Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.","aliases":["GHSA-w5hr-jm4j-9jvq"],"modified":"2026-04-16T04:40:58.959617843Z","published":"2021-02-22T02:15:14.260Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5151"},{"type":"ADVISORY","url":"https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"},{"type":"FIX","url":"https://security.gentoo.org/glsa/202105-06"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"fixed":"e27da524f7bcd7361e3ea5cdfa99c4378a7b5419"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.39"}]}}],"versions":["v2.6.24","v2.6.25","v2.6.26","v2.6.27","v2.6.28","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.20","v3.1.21","v3.1.23","v3.1.24","v3.1.25","v3.1.26","v3.1.27","v3.1.28","v3.1.29","v3.1.30","v3.1.31","v3.1.32","v3.1.33","v3.1.34","v3.1.35","v3.1.36","v3.1.37","v3.1.37.1","v3.1.38"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26119.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}