Description
In Nunjucks versions prior to version 3.2.4, it was possible to bypass the restrictions which are provided by the autoescape functionality. If there are two user-controlled parameters on the same line used in the views, it was possible to inject cross site scripting payloads using the backslash \
character.
Recommendation
Update the nunjucks
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.2.4
- Patched version(s): 3.2.4
References
Related Issues
- cors-anywhere vulnerable to server-side request forgery - CVE-2020-36851
- Valid ECDSA signatures erroneously rejected in Elliptic - CVE-2024-48948
- Trix vulnerable to Cross-site Scripting on copy & paste - CVE-2025-46812
- Froala WYSIWYG editor allows cross-site scripting (XSS) - CVE-2024-51434
- Tags:
- npm
- nunjucks
Anything's wrong? Let us know Last updated on November 26, 2024