Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
CVE ID: CVE-2024-51754
CVSS Base Severity: LOW
CVSS Base Score: 2.2
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
Vendor: twigphp
Product: Twig
EPSS Score: 0.06% (probability of being exploited)
EPSS Percentile: 20.37% (scored less or equal to compared to others)
EPSS Date: 2025-06-05 (when was this score calculated)
SSVC Exploitation: none
SSVC Technical Impact: partial
SSVC Automatable: false