CVE-2018-25047

CVSS V2 None CVSS V3 Medium 5.4
Description
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Overview
  • CVE ID
  • CVE-2018-25047
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-09-15T00:15:09
  • Last Modified Date
  • 2023-03-03T20:00:22
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* 1 OR 3.1.47
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.2.1
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 5.4
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.3
  • Impact Score
  • 2.7
References
Reference URL Reference Tags
https://bugs.gentoo.org/870100 Issue Tracking Third Party Advisory
https://github.com/smarty-php/smarty/issues/454 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/smarty-php/smarty/releases/tag/v3.1.47 Release Notes Third Party Advisory
https://github.com/smarty-php/smarty/releases/tag/v4.2.1 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html
https://security.gentoo.org/glsa/202209-09 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-09-15 01:00:06 Added to TrackCVE
2023-01-05 23:16:11 2023-01-05T23:15:08 CVE Modified Date updated
2023-01-05 23:16:11 Analyzed Modified Vulnerability Status updated
2023-01-05 23:16:12 References updated
2023-01-06 19:15:27 Modified Undergoing Analysis Vulnerability Status updated
2023-02-28 19:13:01 2023-02-28T19:01:54 CVE Modified Date updated
2023-03-03 20:16:04 2023-03-03T20:00:22 CVE Modified Date updated
2023-03-03 20:16:04 Undergoing Analysis Analyzed Vulnerability Status updated