Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2w6w-674q-4c4q | Handlebars.js has JavaScript Injection via AST Type Confusion |
Tue, 31 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:handlebarsjs:handlebars:*:*:*:*:*:node.js:*:* |
Tue, 31 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Handlebarsjs
Handlebarsjs handlebars |
|
| Vendors & Products |
Handlebarsjs
Handlebarsjs handlebars |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable. | |
| Title | Handlebars.js has JavaScript Injection via AST Type Confusion | |
| Weaknesses | CWE-843 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-01T03:55:43.931Z
Reserved: 2026-03-24T19:50:52.103Z
Link: CVE-2026-33937
Updated: 2026-03-31T14:23:15.301Z
Status : Analyzed
Published: 2026-03-27T21:17:27.417
Modified: 2026-03-31T17:49:05.807
Link: CVE-2026-33937
OpenCVE Enrichment
Updated: 2026-03-31T20:00:41Z
Github GHSA