Vulnerabilities/

Pug allows JavaScript code execution if an application accepts untrusted input

Severity:
Medium

Description

Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.

Recommendation

Update the pug package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
pug
Anything's wrong? Let us know Last updated on April 28, 2025

This issue is available in SmartScanner Professional

See Pricing