Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| smarty/smarty(Packagist) | 0 | 3.1.21 | N/A |
CVSS Metrics