Safety vulnerability ID: 47572
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Jinja2 2.8.1 sandboxes format expressions with the same rules as in Jinja if the sandbox mode is used. This solves various information leakage problems that could occur with format strings.
Latest version: 3.1.4
A very fast and expressive template engine.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application