Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1336 — Vulnerability Class 118

118 vulnerabilities classified as CWE-1336. AI Chinese analysis included.

CWE-1336 represents a critical injection vulnerability where applications fail to properly sanitize user-supplied data before passing it to a template engine. This weakness allows attackers to inject malicious template expressions or code directives that the engine interprets as executable logic rather than static text. Exploitation typically occurs when developers directly embed unvalidated user input into templates, enabling remote code execution, server-side request forgery, or sensitive data leakage. To mitigate this risk, developers must strictly enforce input validation and utilize built-in auto-escaping features provided by modern template frameworks. Additionally, implementing the principle of least privilege ensures that even if an injection succeeds, the potential impact is contained. Regular security audits and static code analysis tools can further help identify unsafe template usage patterns before deployment.

MITRE CWE Description
The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine. Many web applications use template engines that allow developers to insert externally-influenced values into free text or messages in order to generate a full web page, document, message, etc. Such engines include Twig, Jinja2, Pug, Java Server Pages, FreeMarker, Velocity, ColdFusion, Smarty, and many others - including PHP itself. Some CMS (Content Management Systems) also use templates. Template engines often have their own custom command or expression language. If an attacker can influence input into a template before it is processed, then the attacker can invoke arbitrary expressions, i.e. perform injection attacks. For example, in some template languages, an attacker could inject the expression "{{7*7}}" and determine if the output returns "49" instead. The syntax varies depending on the language. In some cases, XSS-style attacks can work, which can obscure the root cause if the developer does not closely investigate the root cause of the error. Template engines can be used on the server or client, so both "sides" could be affected by injection. The mechanisms of attack or the affected technologies might be different, but the mistake is fundamentally the same.
Common Consequences (1)
IntegrityExecute Unauthorized Code or Commands
Mitigations (2)
Architecture and DesignChoose a template engine that offers a sandbox or restricted mode, or at least limits the power of any available expressions, function calls, or commands.
ImplementationUse the template engine's sandbox or restricted mode, if available.
CVE IDTitleCVSSSeverityPublished
CVE-2026-44129 Server-side template injection — Secure Email Gateway 9.8AICriticalAI2026-05-08
CVE-2026-44916 OpenStack Ironic 安全漏洞 — Ironic 3.0 Low2026-05-08
CVE-2026-42203 LiteLLM: Server-Side Template Injection in /prompts/test endpoint — litellm 9.6AICriticalAI2026-05-08
CVE-2026-6984 AstrBotDevs AstrBot Dashboard API t2i.py create_template special elements used in a template engine — AstrBot 4.7 Medium2026-04-25
CVE-2026-34587 Kirby has Server-Side Template Injection (SSTI) via double template resolution in option rendering — kirby 6.5AIMediumAI2026-04-24
CVE-2026-40320 Giskard has an Unsandboxed Jinja2 Template Rendering in ConformityCheck — giskard-oss 8.8AIHighAI2026-04-17
CVE-2026-33392 JetBrains YouTrack 安全漏洞 — YouTrack 7.2 High2026-04-17
CVE-2026-5987 Sanluan PublicCMS FreeMarker Template AbstractFreemarkerView.java AbstractFreemarkerView.doRender special elements used in a template engine — PublicCMS 4.7 Medium2026-04-09
CVE-2026-40087 LangChain has incomplete f-string validation in prompt templates — langchain 5.3 Medium2026-04-09
CVE-2026-39980 OpenCTI affected by RCE via notifier template — opencti 9.1 Critical2026-04-09
CVE-2026-35477 InvenTree has SSTI in PART_NAME_FORMAT bypasses CVE-2026-27629 fix via {% if part.pk %} sandbox escape — InvenTree 5.5 Medium2026-04-08
CVE-2026-35044 BentoML has a Server-Side Template Injection via unsandboxed Jinja2 Environment in Dockerfile generation — BentoML 8.8 High2026-04-06
CVE-2026-5559 AntaresMugisho PyBlade AST Validation sandbox.py _is_safe_ast special elements used in a template engine — PyBlade 6.3 Medium2026-04-05
CVE-2026-34202 Zebra node crash — V5 transaction hash panic (P2P reachable) — zebra 7.5AIHighAI2026-03-31
CVE-2026-34172 Giskard Agents have Server-side template injection via ChatWorkflow.chat() using non-sandboxed Jinja2 Environment — giskard-oss 9.8 -2026-03-31
CVE-2026-28228 OpenOLAT: Server-Side Template Injection (SSTI) in Velocity templates allows Remote Code Execution — OpenOLAT 8.8 High2026-03-30
CVE-2026-33897 Incus vulnerable to arbitrary file read and write through pongo templates — incus 10.0 Critical2026-03-26
CVE-2026-33154 dynaconf Affected by Remote Code Execution (RCE) via Insecure Template Evaluation in @jinja Resolver — dynaconf 7.5 High2026-03-20
CVE-2026-32261 RCE via SSTI for users with permissions to access the Craft CMS Webhooks plugin — webhooks 7.5AIHighAI2026-03-16
CVE-2026-31864 JumpServer has a Server-Side Template Injection Leading to RCE via YAML Rendering — jumpserver 6.8 Medium2026-03-13
CVE-2026-22191 Beghelli Sicuro24 SicuroWeb AngularJS Template Injection — SicuroWeb (Sicuro24) 5.2 Medium2026-03-13
CVE-2026-3725 1024-lab/lab1024 SmartAdmin FreeMarker Template MailService.java freemarkerResolverContent special elements used in a template engine — SmartAdmin 6.3 Medium2026-03-08
CVE-2026-3714 OpenCart Incomplete Fix CVE-2024-36694 template.php save special elements used in a template engine — OpenCart 4.7 Medium2026-03-08
CVE-2026-28784 Craft is affected by potential authenticated Remote Code Execution via Twig SSTI — cms 7.2AIHighAI2026-03-04
CVE-2026-28697 Craft Affected by Authenticated RCE via "craft.app.fs.write()" in Twig Templates — cms 7.2AIHighAI2026-03-04
CVE-2026-28695 Craft affected by authenticated RCE via Twig SSTI - create() function + Symfony Process gadget — cms 7.2AIHighAI2026-03-04
CVE-2026-26938 Improper Neutralization of Special Elements Used in a Template Engine in Kibana Workflows Leading to Server-Side Request Forgery (SSRF) — Kibana 8.6 High2026-02-26
CVE-2026-27961 Agenta's Server-Side Template Injection (SSTI) via custom evaluator Jinja2 templates allows RCE — agenta 8.8 High2026-02-26
CVE-2026-27641 Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection — flask-reuploaded 9.8 Critical2026-02-25
CVE-2026-27629 InvenTree Vulnerable to Server Side Template Injection (SSTI) — InvenTree 5.9 Medium2026-02-25

Vulnerabilities classified as CWE-1336 represent 118 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.