WhisperX tag archive

#template-injection

This page collects WhisperX intelligence signals tagged #template-injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab 路 2026-04-11 04:22:30 路 GitHub Issues

1. Critical CodeQL Security Warning: Template Object Injection in 'routes/dataErasure.ts' (CVSS 9.3)

A scheduled security scan has flagged a critical vulnerability in the codebase. The CodeQL analysis tool has identified a Template Object Injection flaw at line 87 of the `routes/dataErasure.ts` file, assigning it a maximum-severity CVSS score of 9.3. This indicates a high-risk security weakness where the template obje...

The Lab 路 2026-04-11 07:22:25 路 GitHub Issues

2. CodeQL Flags Critical Template Object Injection in Juice Shop's Data Erasure Route (CVSS 9.3)

A scheduled security scan has flagged a critical vulnerability in the OWASP Juice Shop project, with a CVSS score of 9.3 indicating a high-severity risk. The automated CodeQL analysis identified a Template Object Injection flaw within the `routes/dataErasure.ts` file, specifically on line 72. This type of vulnerability...

The Lab 路 2026-04-21 01:22:35 路 GitHub Issues

3. 馃敶 Red Team Audit: High-Severity Template Injection in Pipeline YAML via `name` Field

A critical second-order template injection vulnerability allows attackers to inject arbitrary `jobs:` blocks directly into pipeline YAML. The flaw bypasses existing input sanitization by exploiting the compiler's own template syntax, turning a simple `name` field into a vector for code execution. The vulnerability res...