Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29780 | jinjava has Sandbox Bypass via JavaType-Based Deserialization |
Github GHSA |
GHSA-m49c-g9wr-hv6v | jinjava has Sandbox Bypass via JavaType-Based Deserialization |
Thu, 25 Sep 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hubspot:jinjava:*:*:*:*:*:*:*:* |
Thu, 18 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hubspot
Hubspot jinjava |
|
| Vendors & Products |
Hubspot
Hubspot jinjava |
Wed, 17 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1. | |
| Title | jinjava Sandbox Bypass via JavaType-Based Deserialization | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-18T15:45:23.121Z
Reserved: 2025-09-12T12:36:24.635Z
Link: CVE-2025-59340
Updated: 2025-09-18T15:45:20.541Z
Status : Analyzed
Published: 2025-09-17T20:15:36.430
Modified: 2025-09-26T13:11:40.227
Link: CVE-2025-59340
No data.
OpenCVE Enrichment
Updated: 2025-09-18T11:58:51Z
EUVD
Github GHSA