Workaround
This vulnerability can be mitigated by disabling the include macro in Pebble Templates:
java
new PebbleEngine.Builder()
.registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()
.disallowedTokenParserTags(List.of("include"))
.build())
.build();
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5321 | Pebble has Arbitrary Local File Inclusion (LFI) Vulnerability via `include` macro |
Github GHSA |
GHSA-p75g-cxfj-7wrx | Pebble has Arbitrary Local File Inclusion (LFI) Vulnerability via `include` macro |
Sun, 19 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build(); | Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build(); |
| References |
|
Fri, 19 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 07 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pebbletemplates
Pebbletemplates pebble |
|
| CPEs | cpe:2.3:a:pebbletemplates:pebble:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pebbletemplates
Pebbletemplates pebble |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 27 Feb 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | io.pebbletemplates:pebble: Path Traversal Vulnerability in Pebble Templates | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 27 Feb 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build(); | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-04-19T07:54:57.303Z
Reserved: 2025-02-25T10:32:01.608Z
Link: CVE-2025-1686
Updated: 2025-12-19T16:08:39.301Z
Status : Modified
Published: 2025-02-27T05:15:14.143
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-1686
OpenCVE Enrichment
Updated: 2026-04-20T15:45:10Z
EUVD
Github GHSA