Twig versions 2.16.x and 3.9.0 through 3.25.x contain a sandbox bypass vulnerability when using a SourcePolicyInterface that allows attackers with template rendering capabilities to pass arbitrary PHP callables to sort, filter, map, and reduce filters. Attackers can exploit the runtime check that fails to use the current template source to bypass sandbox restrictions and execute arbitrary code when the sandbox is enabled through a source policy rather than globally.
Metrics
Affected Vendors & Products
References
History
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Twig versions 2.16.x and 3.9.0 through 3.25.x contain a sandbox bypass vulnerability when using a SourcePolicyInterface that allows attackers with template rendering capabilities to pass arbitrary PHP callables to sort, filter, map, and reduce filters. Attackers can exploit the runtime check that fails to use the current template source to bypass sandbox restrictions and execute arbitrary code when the sandbox is enabled through a source policy rather than globally. | |
| Title | Twig 2.16.x & 3.9.0-3.25.x Sandbox Bypass via SourcePolicyInterface | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T15:44:33.359Z
Reserved: 2026-01-22T20:23:19.801Z
Link: CVE-2026-24425
Updated: 2026-05-20T15:43:59.873Z
Status : Awaiting Analysis
Published: 2026-05-20T14:16:38.917
Modified: 2026-05-20T14:25:57.283
Link: CVE-2026-24425
No data.
OpenCVE Enrichment
Updated: 2026-05-20T15:30:33Z