6.1
CVSSv3

CVE-2023-28447

Published: 28/03/2023 Updated: 01/02/2024
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

smarty smarty

fedoraproject fedora 36

fedoraproject fedora 37

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1033964 smarty3: CVE-2023-28447: Cross site scripting vulnerability in Javascript escaping Package: src:smarty3; Maintainer for src:smarty3 is Mike Gabriel <sunweaver@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 5 Apr 2023 05:57:02 UTC Severity: important Ta ...

Github Repositories

Module for PrestaShop 1.7.X to fix CVE-2023-28447 vulnerability (Smarty XSS)

LabelGrup Networks, official PrestaShop Partner Module for PrestaShop 17X to fix CVE-2023-28447 vulnerability (Smarty JavaScript XSS) For further information, check the following links: CVE: nvdnistgov/vuln/detail/CVE-2023-28447 GitHub: githubcom/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj Instructions: Download the latest release from thi