{"id":"UBUNTU-CVE-2023-28447","details":"Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.","modified":"2026-02-04T02:25:14.137874Z","published":"2023-03-28T21:15:00Z","related":["USN-6550-1","USN-7158-1"],"upstream":["CVE-2023-28447"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-28447"},{"type":"REPORT","url":"https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj"},{"type":"REPORT","url":"https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6550-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-28447"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7158-1"}],"affected":[{"package":{"name":"civicrm","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/civicrm@4.7.1+dfsg-2ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.7.1+dfsg-1","4.7.1+dfsg-2","4.7.1+dfsg-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.7.1+dfsg-2ubuntu1","binary_name":"civicrm-common"},{"binary_version":"4.7.1+dfsg-2ubuntu1","binary_name":"civicrm-l10n"},{"binary_version":"4.7.1+dfsg-2ubuntu1","binary_name":"drupal7-mod-civicrm"},{"binary_version":"4.7.1+dfsg-2ubuntu1","binary_name":"wordpress-civicrm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/smarty3@3.1.21-1ubuntu1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.21-1","3.1.21-1ubuntu1","3.1.21-1ubuntu1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.21-1ubuntu1+esm1","binary_name":"smarty3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"civicrm","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/civicrm@4.7.30+dfsg-1ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.7.23+dfsg-1ubuntu1","4.7.24+dfsg-1ubuntu1","4.7.30+dfsg-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.7.30+dfsg-1ubuntu1","binary_name":"civicrm-common"},{"binary_version":"4.7.30+dfsg-1ubuntu1","binary_name":"civicrm-l10n"},{"binary_version":"4.7.30+dfsg-1ubuntu1","binary_name":"wordpress-civicrm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"postfixadmin","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/postfixadmin@3.0.2-2ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-2ubuntu0.1~esm1"}]}],"versions":["3.0.2-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.0.2-2ubuntu0.1~esm1","binary_name":"postfixadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/smarty3@3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1"}]}],"versions":["3.1.31+20161214.1.c7d42e4+selfpack1-2","3.1.31+20161214.1.c7d42e4+selfpack1-3","3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1","binary_name":"smarty3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/smarty3@3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1"}]}],"versions":["3.1.33+20180830.1.3a78a21f+selfpack1-1","3.1.34+20190228.1.c9f0de05+selfpack1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1","binary_name":"smarty3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"civicrm","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/civicrm@5.21.2+dfsg-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.11.0+dfsg-1","5.18.1+dfsg-1","5.20.3+dfsg-1","5.21.0+dfsg-1","5.21.1+dfsg-1","5.21.2+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.21.2+dfsg-1","binary_name":"civicrm-common"},{"binary_version":"5.21.2+dfsg-1","binary_name":"civicrm-l10n"},{"binary_version":"5.21.2+dfsg-1","binary_name":"wordpress-civicrm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"postfixadmin","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/postfixadmin@3.2.1-3ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.1-3ubuntu0.1~esm1"}]}],"versions":["3.2.1-2","3.2.1-3"],"ecosystem_specific":{"binaries":[{"binary_version":"3.2.1-3ubuntu0.1~esm1","binary_name":"postfixadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"civicrm","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/civicrm@5.33.2+dfsg1-1ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.33.2+dfsg1-1","5.33.2+dfsg1-1build1","5.33.2+dfsg1-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.33.2+dfsg1-1ubuntu1","binary_name":"civicrm-common"},{"binary_version":"5.33.2+dfsg1-1ubuntu1","binary_name":"civicrm-l10n"},{"binary_version":"5.33.2+dfsg1-1ubuntu1","binary_name":"wordpress-civicrm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/smarty3@3.1.39-2ubuntu1.22.04.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.39-2ubuntu1.22.04.2"}]}],"versions":["3.1.39-2","3.1.39-2ubuntu1","3.1.39-2ubuntu1.22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.39-2ubuntu1.22.04.2","binary_name":"smarty3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"postfixadmin","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/postfixadmin@3.3.10-2ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.10-2ubuntu0.1~esm1"}]}],"versions":["3.3.7-1","3.3.10-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.3.10-2ubuntu0.1~esm1","binary_name":"postfixadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"postfixadmin","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/postfixadmin@3.3.13-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.3.13-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.3.13-1","binary_name":"postfixadmin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/smarty3@3.1.48-1ubuntu0.24.04.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.48-1ubuntu0.24.04.1"}]}],"versions":["3.1.48-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.48-1ubuntu0.24.04.1","binary_name":"smarty3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"postfixadmin","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/postfixadmin@3.3.15+ds-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.3.15+ds-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.3.15+ds-2","binary_name":"postfixadmin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}},{"package":{"name":"smarty3","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/smarty3@3.1.48-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.48-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.48-2","binary_name":"smarty3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28447.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"high"}]}