{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "3.0.0"
              },
              {
                "fixed": "3.1.32"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "ac9d4b587e5bf53381e21881820a9830765cb459"
            }
          ],
          "repo": "https://github.com/smarty-php/smarty",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.",
  "id": "CVE-2017-1000480",
  "modified": "2026-04-01T23:10:20.310104341Z",
  "published": "2018-01-03T18:29:00.370Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.debian.org/security/2018/dsa-4094"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}