JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hubspot
Hubspot jinjava |
|
| Vendors & Products |
Hubspot
Hubspot jinjava |
Wed, 04 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3. | |
| Title | JinJava Bypass through ForTag leads to Arbitrary Java Execution | |
| Weaknesses | CWE-1336 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-04T21:26:58.572Z
Updated: 2026-02-05T21:01:00.454Z
Reserved: 2026-02-02T19:59:47.372Z
Link: CVE-2026-25526
Updated: 2026-02-05T21:00:55.395Z
Status : Awaiting Analysis
Published: 2026-02-04T22:15:59.510
Modified: 2026-02-05T14:57:20.563
Link: CVE-2026-25526
No data.