Lucene search

K
PalletsJinja

5 matches found

CVE
CVE
added 2025/03/05 9:15 p.m.1346 views

CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the c...

5.4CVSS7.6AI score0.00058EPSS
CVE
CVE
added 2024/12/23 4:15 p.m.772 views

CVE-2024-56326

Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the conte...

7.8CVSS7.1AI score0.00118EPSS
CVE
CVE
added 2024/01/11 3:15 a.m.445 views

CVE-2024-22195

Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja xmlattr filter can be abused t...

6.1CVSS6.6AI score0.00093EPSS
CVE
CVE
added 2024/12/23 4:15 p.m.305 views

CVE-2024-56201

Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, ...

5.4CVSS8.6AI score0.00074EPSS
CVE
CVE
added 2024/05/06 3:15 p.m.291 views

CVE-2024-34064

Jinja is an extensible templating engine. The xmlattr filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, /, >, or =, as each would then be interpreted as starting a separate attribute. If an application accepts keys (...

5.4CVSS6.2AI score0.00168EPSS