Vulnerability Details : CVE-2018-25047
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2018-25047
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-25047
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-25047
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2018-25047
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-25047
-
https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html
[SECURITY] [DLA 3262-1] smarty3 security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202209-09
Smarty: Multiple vulnerabilities (GLSA 202209-09) — Gentoo securityThird Party Advisory
-
https://github.com/smarty-php/smarty/issues/454
smarty_function_mailto - JavaScript injection in eval function · Issue #454 · smarty-php/smarty · GitHubExploit;Issue Tracking;Patch;Third Party Advisory
-
https://github.com/smarty-php/smarty/releases/tag/v3.1.47
Release v3.1.47 · smarty-php/smarty · GitHubRelease Notes
-
https://github.com/smarty-php/smarty/releases/tag/v4.2.1
Release v4.2.1 · smarty-php/smarty · GitHubRelease Notes
-
https://bugs.gentoo.org/870100
870100 – (CVE-2018-25047) <dev-php/smarty-4.2.1: javascript injection in mailto functionIssue Tracking;Third Party Advisory
Jump to