Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Twig versions 2.16.x and 3.9.0 through 3.25.x contain a sandbox bypass vulnerability when using a SourcePolicyInterface that allows attackers with template rendering capabilities to pass arbitrary PHP callables to sort, filter, map, and reduce filters. Attackers can exploit the runtime check that fails to use the current template source to bypass sandbox restrictions and execute arbitrary code when the sandbox is enabled through a source policy rather than globally. | |
| Title | Twig 2.16.x & 3.9.0-3.25.x Sandbox Bypass via SourcePolicyInterface | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T15:44:33.359Z
Reserved: 2026-01-22T20:23:19.801Z
Link: CVE-2026-24425
Updated: 2026-05-20T15:43:59.873Z
Status : Awaiting Analysis
Published: 2026-05-20T14:16:38.917
Modified: 2026-05-20T14:25:57.283
Link: CVE-2026-24425
No data.
OpenCVE Enrichment
Updated: 2026-05-20T15:30:33Z