Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33940— Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial

CVSS 8.1 · High EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33940

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial
Source: NVD (National Vulnerability Database)
Vulnerability Description
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in `resolvePartial()` and cause `invokePartial()` to return `undefined`. The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to `env.compile()`. Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (`require('handlebars/runtime')`). Without `compile()`, the fallback compilation path in `invokePartial` is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups (`{{> (lookup ...)}}`) when context data is user-controlled.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
handlebars 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
handlebars是一款语义化的Web模板系统。 Handlebars 4.7.8及之前版本存在安全漏洞,该漏洞源于特制对象可绕过resolvePartial中的所有条件防护,可能导致攻击者执行任意命令,引发服务器端远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
handlebars-langhandlebars.js >= 4.0.0, < 4.7.9 -

II. Public POCs for CVE-2026-33940

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 7902 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month

III. Intelligence Information for CVE-2026-33940

登录查看更多情报信息。

Same Patch Batch · handlebars-lang · 2026-03-27 · 6 CVEs total

CVE-2026-339379.8 CRITICALHandlebars.js has JavaScript Injection via AST Type Confusion
CVE-2026-339418.3 HIGHHandlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options
CVE-2026-339388.1 HIGHHandlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block
CVE-2026-339397.5 HIGHHandlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation
CVE-2026-339164.7 MEDIUMHandlebars.js has Prototype Pollution Leading to XSS through Partial Template Injection

IV. Related Vulnerabilities

V. Comments for CVE-2026-33940

No comments yet


Leave a comment