{"id":"CVE-2018-16831","details":"Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.","aliases":["GHSA-65j5-vpm7-6xp4"],"modified":"2026-04-16T00:08:47.064552264Z","published":"2018-09-11T13:29:01.293Z","references":[{"type":"EVIDENCE","url":"https://github.com/smarty-php/smarty/issues/486"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"last_affected":"ac9d4b587e5bf53381e21881820a9830765cb459"}],"database_specific":{"cpe":"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"3.0.0"},{"last_affected":"3.1.32"}]}}],"versions":["v2.6.24","v2.6.25","v2.6.26","v2.6.27","v2.6.28","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.20","v3.1.21","v3.1.23","v3.1.24","v3.1.25","v3.1.26","v3.1.27","v3.1.28","v3.1.29","v3.1.30","v3.1.31","v3.1.32"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-16831.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}