CVE-2026-25526
- EPSS 0.04%
- Veröffentlicht 04.02.2026 21:26:58
- Zuletzt bearbeitet 20.02.2026 21:00:42
JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java cla...
- EPSS 0.55%
- Veröffentlicht 17.09.2025 20:15:36
- Zuletzt bearbeitet 26.09.2025 13:11:40
jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserial...
CVE-2020-12668
- EPSS 0.33%
- Veröffentlicht 19.02.2021 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:00:01
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
CVE-2018-18893
- EPSS 0.45%
- Veröffentlicht 03.01.2019 01:29:00
- Zuletzt bearbeitet 21.11.2024 03:56:50
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.