CVE-2024-51754

Publication date 6 November 2024

Last updated 30 May 2025


Ubuntu priority

Cvss 3 Severity Score

2.2 · Low

Score breakdown

Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

Status

Package Ubuntu Release Status
php-twig 25.04 plucky
Not affected
24.10 oracular
Vulnerable
24.04 LTS noble
Fixed 3.8.0-2ubuntu0.1~esm1
22.04 LTS jammy
Fixed 3.3.8-2ubuntu4+esm2
20.04 LTS focal
Fixed 2.12.5-1ubuntu0.1~esm2
twig 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

Severity score breakdown

Parameter Value
Base score 2.2 · Low
Attack vector Network
Attack complexity High
Privileges required High
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N