4 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

29 Jan 2025 — Twig is a template language for PHP. When using the ?? operator, output escaping was missing for the expression on the left side of the operator. This vulnerability is fixed in 3.19.0. • https://github.com/twigphp/Twig/commit/38576b12f05df3cc871bf68f39ccb46b418334a3 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 2.2EPSS: 0%CPEs: 2EXPL: 0

06 Nov 2024 — Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue. • https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 2.2EPSS: 0%CPEs: 2EXPL: 0

06 Nov 2024 — Twig is a template language for PHP. In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. • https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.6EPSS: 0%CPEs: 3EXPL: 0

09 Sep 2024 — Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0. Fabien Potencier discovered that under some conditions the sandbox mechanism of Twig, a template engine for PHP, could by bypassed. • https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6 • CWE-693: Protection Mechanism Failure •