Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
github.com/FriendsOfPHP/security-advisories/blob/master/smarty/smarty/CVE-2021-26120.yaml
github.com/smarty-php/smarty
github.com/smarty-php/smarty/blob/master/CHANGELOG.md
github.com/smarty-php/smarty/blob/master/CHANGELOG.md#3139---2021-02-17
github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838
github.com/smarty-php/smarty/security/advisories/GHSA-3rpf-5rqv-689q
lists.debian.org/debian-lts-announce/2021/04/msg00004.html
lists.debian.org/debian-lts-announce/2021/04/msg00014.html
nvd.nist.gov/vuln/detail/CVE-2021-26120
security.gentoo.org/glsa/202105-06
srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html
www.debian.org/security/2022/dsa-5151