Lookup for vulnerable packages by Package URL.

Purlpkg:composer/twig/twig@3.9.3
Typecomposer
Namespacetwig
Nametwig
Version3.9.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.11.2
Latest_non_vulnerable_version3.19.0
Affected_by_vulnerabilities
0
url VCID-1au7-86r7-8qdn
vulnerability_id VCID-1au7-86r7-8qdn
summary
Twig has unguarded calls to `__toString()` when nesting an object into an array
### Description

In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance).

### Resolution

The sandbox mode now checks the `__toString()` method call on all objects.

The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/cafc608ece310e62a35a76f17e25c04ab9ed05cc) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/d4a302681bca9f7c6ce2835470d53609cdf3e23e) for the 3.x branch.

### Credits

We would like to thank Jamie Schouten for reporting the issue and Fabien Potencier for providing the fix.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51754
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33211
published_at 2026-04-08T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33201
published_at 2026-04-18T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33224
published_at 2026-04-16T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33184
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-12T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33248
published_at 2026-04-11T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33303
published_at 2026-04-02T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33335
published_at 2026-04-04T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33167
published_at 2026-04-07T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33244
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51754
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51754
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-51754.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-51754.yaml
3
reference_url https://github.com/twigphp/Twig
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/twigphp/Twig
4
reference_url https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T19:40:22Z/
url https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73
5
reference_url https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T19:40:22Z/
url https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6
6
reference_url https://lists.debian.org/debian-lts-announce/2025/05/msg00039.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/05/msg00039.html
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51754
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51754
8
reference_url https://symfony.com/blog/unguarded-calls-to-__tostring-when-nesting-an-object-into-an-array
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://symfony.com/blog/unguarded-calls-to-__tostring-when-nesting-an-object-into-an-array
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086884
reference_id 1086884
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086884
10
reference_url https://github.com/advisories/GHSA-6377-hfv9-hqf6
reference_id GHSA-6377-hfv9-hqf6
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6377-hfv9-hqf6
11
reference_url https://usn.ubuntu.com/7456-1/
reference_id USN-7456-1
reference_type
scores
url https://usn.ubuntu.com/7456-1/
fixed_packages
0
url pkg:composer/twig/twig@3.11.2
purl pkg:composer/twig/twig@3.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.11.2
1
url pkg:composer/twig/twig@3.14.1
purl pkg:composer/twig/twig@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.14.1
aliases CVE-2024-51754, GHSA-6377-hfv9-hqf6
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1au7-86r7-8qdn
1
url VCID-cd24-q2ys-yfbe
vulnerability_id VCID-cd24-q2ys-yfbe
summary
Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled
### Description

In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy.
They are now checked via the property policy and the `__isset()` method is now called after the security check.
**This is a BC break.**

### Resolution

The sandbox mode now ensures access to array-like's properties is allowed.

The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/ec39a9dccc5fb4eaaba55e5d79a6f84a8dd8b69d) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/b957e5a44cc0075d04ccff52f8fa9d8e6db3e3a0) for the 3.x branch.

### Credits

We would like to thank Jamie Schouten for reporting the issue and Nicolas Grekas for providing the fix.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51755
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35179
published_at 2026-04-02T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35127
published_at 2026-04-18T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35141
published_at 2026-04-16T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35104
published_at 2026-04-13T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35128
published_at 2026-04-12T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35163
published_at 2026-04-11T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35159
published_at 2026-04-09T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35133
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35089
published_at 2026-04-07T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35208
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51755
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51755
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-51755.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-51755.yaml
3
reference_url https://github.com/twigphp/Twig
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/twigphp/Twig
4
reference_url https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T19:44:58Z/
url https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21
5
reference_url https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T19:44:58Z/
url https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51755
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51755
7
reference_url https://symfony.com/blog/unguarded-calls-to-__isset-and-to-array-accesses-when-the-sandbox-is-enabled
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://symfony.com/blog/unguarded-calls-to-__isset-and-to-array-accesses-when-the-sandbox-is-enabled
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086884
reference_id 1086884
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086884
9
reference_url https://github.com/advisories/GHSA-jjxq-ff2g-95vh
reference_id GHSA-jjxq-ff2g-95vh
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jjxq-ff2g-95vh
fixed_packages
0
url pkg:composer/twig/twig@3.11.2
purl pkg:composer/twig/twig@3.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.11.2
1
url pkg:composer/twig/twig@3.14.1
purl pkg:composer/twig/twig@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.14.1
aliases CVE-2024-51755, GHSA-jjxq-ff2g-95vh
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd24-q2ys-yfbe
2
url VCID-etje-vrfw-nbh4
vulnerability_id VCID-etje-vrfw-nbh4
summary
Twig has a possible sandbox bypass
### Description

Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions.

The security issue happens when all these conditions are met:

 * The sandbox is disabled globally;
 * The sandbox is enabled via a sandboxed `include()` function which references a template name (like `included.twig`) and not a `Template` or `TemplateWrapper` instance;
 * The included template has been loaded before the `include()` call but in a non-sandbox context (possible as the sandbox has been globally disabled).

### Resolution

The patch ensures that the sandbox security checks are always run at runtime.

### Credits

We would like to thank Fabien Potencier for reporting and fixing the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45411
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-02T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34727
published_at 2026-04-18T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34742
published_at 2026-04-16T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-13T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-12T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34769
published_at 2026-04-11T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-09T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34737
published_at 2026-04-08T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34694
published_at 2026-04-07T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34817
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45411
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45411
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-45411.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-45411.yaml
3
reference_url https://github.com/twigphp/Twig
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/twigphp/Twig
4
reference_url https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-09T18:37:50Z/
url https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6
5
reference_url https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-09T18:37:50Z/
url https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de
6
reference_url https://github.com/twigphp/Twig/commit/41103dcdc2daab4c83cdd05b5b4fde5b7e41e635
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/twigphp/Twig/commit/41103dcdc2daab4c83cdd05b5b4fde5b7e41e635
7
reference_url https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-09T18:37:50Z/
url https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233
8
reference_url https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-09T18:37:50Z/
url https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-45411
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-45411
10
reference_url https://symfony.com/blog/twig-security-release-possible-sandbox-bypass
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 5.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://symfony.com/blog/twig-security-release-possible-sandbox-bypass
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081561
reference_id 1081561
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081561
12
reference_url https://github.com/advisories/GHSA-6j75-5wfj-gh66
reference_id GHSA-6j75-5wfj-gh66
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6j75-5wfj-gh66
13
reference_url https://usn.ubuntu.com/7456-1/
reference_id USN-7456-1
reference_type
scores
url https://usn.ubuntu.com/7456-1/
14
reference_url https://usn.ubuntu.com/7549-1/
reference_id USN-7549-1
reference_type
scores
url https://usn.ubuntu.com/7549-1/
fixed_packages
0
url pkg:composer/twig/twig@3.11.1
purl pkg:composer/twig/twig@3.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1au7-86r7-8qdn
1
vulnerability VCID-cd24-q2ys-yfbe
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.11.1
1
url pkg:composer/twig/twig@3.14.0
purl pkg:composer/twig/twig@3.14.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1au7-86r7-8qdn
1
vulnerability VCID-cd24-q2ys-yfbe
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.14.0
aliases CVE-2024-45411, GHSA-6j75-5wfj-gh66
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etje-vrfw-nbh4
Fixing_vulnerabilities
Risk_score3.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/twig/twig@3.9.3