Loading HuntDB...

GHSA-h5c8-rqwp-cp95

GitHub Security Advisory

Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

The `xmlattr` filter in affected versions of Jinja accepts keys containing spaces. XML/HTML attributes cannot contain spaces, as each would then be interpreted as a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. Note that accepting keys as user input is not common or a particularly intended use case of the `xmlattr` filter, and an application doing so should already be verifying what keys are provided regardless of this fix.

Affected Packages

PyPI jinja2
Affected versions: 0 (fixed in 3.1.3)

Related CVEs

Key Information

GHSA ID
GHSA-h5c8-rqwp-cp95
Published
January 11, 2024 3:20 PM
Last Modified
February 13, 2025 7:31 PM
CVSS Score
5.0 /10
Primary Ecosystem
PyPI
Primary Package
jinja2
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 11, 2025 6:21 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.