Unrated severityNVD Advisory· Published Oct 31, 2008· Updated Apr 23, 2026
CVE-2008-4810
CVE-2008-4810
Description
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
Affected products
56cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*+ 55 more
- cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/32329nvdVendor Advisory
- code.google.com/p/smarty-php/source/detailnvd
- code.google.com/p/smarty-php/source/detailnvd
- securityvulns.ru/Udocument746.htmlnvd
- smarty-php.googlecode.com/svn/trunk/NEWSnvd
- www.debian.org/security/2008/dsa-1691nvd
- www.openwall.com/lists/oss-security/2008/10/25/2nvd
- www.securityfocus.com/bid/31862nvd
- bugs.gentoo.org/attachment.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/46031nvd
News mentions
0No linked articles in our index yet.