Loading HuntDB...

GHSA-q2x7-8rv6-6q7h

GitHub Security Advisory

Jinja has a sandbox breakout through indirect reference to format method

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

An oversight in how the Jinja sandboxed environment detects calls to `str.format` allows an attacker that controls the content of a template to execute arbitrary Python code.

To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates.

Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's `format` method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox.

Affected Packages

PyPI jinja2
Affected versions: 0 (fixed in 3.1.5)

Related CVEs

Key Information

GHSA ID
GHSA-q2x7-8rv6-6q7h
Published
December 23, 2024 5:56 PM
Last Modified
December 27, 2024 7:10 PM
CVSS Score
5.0 /10
Primary Ecosystem
PyPI
Primary Package
jinja2
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 10, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.