CVE-2026-25526
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/02/2026
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Referencias a soluciones, herramientas e información
- https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998
- https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441
- https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6
- https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3
- https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74



