// For flags

CVE-2024-51754

Unguarded calls to __toString() when nesting an object into an array in Twig

Severity Score

2.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
Multiple
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-10-31 CVE Reserved
  • 2024-11-06 CVE Published
  • 2024-11-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-668: Exposure of Resource to Wrong Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Twigphp
Search vendor "Twigphp"
Twig
Search vendor "Twigphp" for product "Twig"
< 3.11.2
Search vendor "Twigphp" for product "Twig" and version " < 3.11.2"
en
Affected
Twigphp
Search vendor "Twigphp"
Twig
Search vendor "Twigphp" for product "Twig"
>= 3.12.0 < 3.14.1
Search vendor "Twigphp" for product "Twig" and version " >= 3.12.0 < 3.14.1"
en
Affected