The Lab · 2026-04-07 04:27:15 · GitHub Issues
A critical sandbox escape vulnerability in the widely-used Jinja2 templating engine allows attackers to execute arbitrary Python code. The flaw, tracked as CVE-2025-27516, stems from an oversight in how the sandboxed environment interacts with the `|attr` filter. This bypass enables a threat actor who controls template...
The Lab · 2026-04-13 03:22:33 · GitHub Issues
A high-severity security flaw has been identified within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) vulnerability. The automated security scanner Bandit flagged a critical misconfiguration in the Jinja2 templating engine used by the `superset-extensions-cli` project. Specifically, th...
The Lab · 2026-04-13 03:22:34 · GitHub Issues
A high-severity security vulnerability has been flagged within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) attack vector. The flaw, identified as B701 by the Bandit security scanner, resides in the `superset-extensions-cli` tool, specifically at line 834 of the `cli.py` file. The core...
The Lab · 2026-04-13 03:22:36 · GitHub Issues
A high-severity security vulnerability has been flagged in a critical Jinja2 template configuration. The automated scanner Bandit identified rule B701 (CWE-94) in the file `scripts/erd/erd.py` at line 174. The core issue is that the Jinja2 environment is configured with `autoescape=False` by default, creating a direct ...
The Lab · 2026-04-13 05:22:38 · GitHub Issues
A critical security vulnerability in the widely-used Jinja2 templating engine has prompted an urgent update. The flaw, tracked as CVE-2024-22195, resides in the `xmlattr` filter, which in affected versions incorrectly accepts keys containing spaces. This creates a direct path for XML or HTML attribute injection, as eac...
The Lab · 2026-04-14 04:22:35 · GitHub Issues
A high-severity security flaw has been identified within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) vulnerability. The automated security scanner Bandit flagged a critical misconfiguration in the `superset-extensions-cli` project, where Jinja2 templates are set with `autoescape=False...
The Lab · 2026-04-14 04:22:36 · GitHub Issues
A critical security flaw has been identified in the Apache Superset extensions command-line tool, exposing the platform to potential cross-site scripting (XSS) attacks. The vulnerability, flagged as HIGH severity by the Bandit security scanner, stems from the Jinja2 templating engine's default configuration of `autoesc...
The Lab · 2026-04-14 04:22:37 · GitHub Issues
A high-severity security vulnerability has been flagged in the codebase, exposing a potential cross-site scripting (XSS) risk. The automated scanner Bandit identified rule B701 in the file `scripts/erd/erd.py` at line 174. The core issue is that the Jinja2 template engine is configured with `autoescape=False` by defaul...
The Lab · 2026-04-14 08:22:37 · GitHub Issues
A high-severity security flaw has been identified in the Apache Superset extensions command-line interface (CLI), exposing the platform to potential cross-site scripting (XSS) attacks. The vulnerability, flagged by the Bandit security scanner as rule B701, stems from the Jinja2 templating engine's default configuration...
The Lab · 2026-04-14 08:22:39 · GitHub Issues
A high-severity security vulnerability has been flagged within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) attack vector. The automated security scanner Bandit identified the issue as rule B701 (CWE-94) in a test file for the `superset-extensions-cli`, where the Jinja2 templating engi...
The Lab · 2026-04-28 23:54:08 · GitHub Issues
A critical Server-Side Template Injection (SSTI) vulnerability has been identified in Apache Superset, the widely deployed open-source data exploration and visualization platform. The flaw resides in `superset/jinja_context.py` within the `get_template_processor` and `process_template` functions, where user-supplied in...
The Lab · 2026-04-30 07:54:11 · GitHub Issues
Qbeast-io/qbeast-spark项目因使用存在安全漏洞的Jinja2模板引擎,面临代码执行风险。GitHub安全实验室最新披露的CVE-2024-56326(GHSA-q2x7-8rv6-6q7h)显示,Jinja沙箱环境在检测str.format方法调用时存在逻辑缺陷,攻击者可通过间接引用绕过年sandbox防护,在模板内容受控的场景下执行任意Python代码。该漏洞被定性为中等严重程度,但实际危害取决于应用程序是否允许处理不可信模板。
漏洞根源在于Jinja沙箱虽能拦截直接的形式调用,但未能防御通过变量传递的间接format方法引用。Dependabot安全警报显示,qbeast-spark运行时依赖的jinja2...
The Lab · 2026-04-30 07:54:12 · GitHub Issues
A critical compiler flaw in Jinja2, the widely-used Python templating engine, enables attackers who control both the content and filename of a template to escape Jinja's sandbox protections and execute arbitrary Python code. The vulnerability, tracked as CVE-2024-56201 and rated medium severity, has been flagged via Gi...
The Lab · 2026-04-30 07:54:13 · GitHub Issues
A confirmed medium-severity vulnerability in Jinja2 has been identified in the Qbeast-spark repository, raising concerns about sandbox security in template rendering environments. CVE-2025-27516 allows an attacker who controls template content to bypass Jinja's sandbox protections and execute arbitrary Python code. The...