{"id":"CVE-2021-26119","details":"Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.","aliases":["GHSA-w5hr-jm4j-9jvq"],"modified":"2026-05-18T05:52:47.468306825Z","published":"2021-02-22T02:15:14.260Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"},{"last_affected":"11.0"}],"vendor_product":"debian:debian_linux"}]},"references":[{"type":"ADVISORY","url":"https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5151"},{"type":"FIX","url":"https://security.gentoo.org/glsa/202105-06"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"fixed":"e27da524f7bcd7361e3ea5cdfa99c4378a7b5419"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"3.1.39"}]}}],"versions":["v3.1.38","v3.1.37.1","v3.1.37","v3.1.36","v3.1.35","v3.1.34","v3.1.33","v3.1.32","v3.1.31","v3.1.30","v3.1.29","v3.1.28","v2.6.28","v3.1.27","v3.1.26","v3.1.25","v3.1.24","v3.1.23","v3.1.21","v3.1.20","v3.1.19","v3.1.18","v3.1.17","v3.1.16","v3.1.15","v3.1.14","v3.1.13","v3.1.12","v3.1.11","v2.6.27","v2.6.26","v2.6.25","v2.6.24"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-26119.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}