Safety vulnerability ID: 70612
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In Jinja2, the from_string function is prone to Server Side Template Injection (SSTI) where it takes the source parameter as a template object, renders it, and then returns it. The attacker can exploit it with INJECTION COMMANDS in a URI.
NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.
Latest version: 3.1.4
A very fast and expressive template engine.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application