Vulnerabilities/

Remote code execution via the `pretty` option.

Severity:
Medium

Description

If a remote attacker was able to control the pretty option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.

Recommendation

Update the pug package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
pug
Anything's wrong? Let us know Last updated on May 28, 2025

This issue is available in SmartScanner Professional

See Pricing