Skip to content
Threat Feed

Tag

Template-Injection

9 briefs RSS
critical advisory

NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)

NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.

NetBox rce template-injection cve-2026-29514
2r 1t 1c
high advisory

Kirby CMS Server-Side Template Injection via Double Template Resolution

A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.

cms ssti kirby template-injection
2r 1t
critical advisory

PraisonAI Template Injection Vulnerability (CVE-2026-40154)

PraisonAI before version 4.5.128 is vulnerable to supply chain attacks due to treating remotely fetched template files as trusted executable code without proper verification, enabling exploitation via malicious templates.

cve-2026-40154 template-injection supply-chain
2r 1t 1c 2i
critical advisory

GLPI Template Injection RCE (CVE-2026-26026)

GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.

cve-2026-26026 template-injection rce glpi
2r 3t 1c 1i
critical advisory

lodash _.template Function Injection Vulnerability (CVE-2026-4800)

CVE-2026-4800 allows attackers to inject arbitrary code at template compilation time via untrusted input passed as key names in the options.imports object of the _.template function in lodash versions prior to 4.18.0, potentially leading to remote code execution.

lodash template-injection rce cve-2026-4800
2r 2t 2c
critical advisory

Incus Instance Template Vulnerability CVE-2026-33897

A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.

incus template-injection privilege-escalation CVE-2026-33897 linux
3r 1t
high advisory

LiteLLM Server-Side Template Injection Vulnerability

A server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.

LiteLLM ssti template-injection code-execution
2r 1t
medium advisory

liquidjs Denial of Service via Circular Block Reference

A vulnerability in liquidjs versions prior to 10.25.7 allows for denial of service due to a circular block reference in the layout, causing an infinite recursive loop that exhausts memory and crashes the Node.js process.

liquidjs denial-of-service template-injection
2r 1t
high advisory

Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection

Beghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.

Sicuro24 SicuroWeb +1 cve-2026-41468 angularjs template-injection mitm
2r 1t 1c