Логотип exploitDog
bind:CVE-2026-25526
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25526

Количество 2

Количество 2

nvd логотип

CVE-2026-25526

4 дня назад

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gjx9-j8f8-7j74

6 дней назад

JinJava Bypass through ForTag leads to Arbitrary Java Execution

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25526

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

CVSS3: 9.8
0%
Низкий
4 дня назад
github логотип
GHSA-gjx9-j8f8-7j74

JinJava Bypass through ForTag leads to Arbitrary Java Execution

CVSS3: 9.8
0%
Низкий
6 дней назад

Уязвимостей на страницу