Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rv5g-f82m-qrvv | LiquidJS: ownPropertyOnly bypass via sort_natural filter — prototype property information disclosure through sorting side-channel |
Mon, 20 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Liquidjs
Liquidjs liquidjs |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:liquidjs:liquidjs:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Liquidjs
Liquidjs liquidjs |
Thu, 09 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Harttle
Harttle liquidjs |
|
| Vendors & Products |
Harttle
Harttle liquidjs |
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.4, the sort_natural filter bypasses the ownPropertyOnly security option, allowing template authors to extract values of prototype-inherited properties through a sorting side-channel attack. Applications relying on ownPropertyOnly: true as a security boundary (e.g., multi-tenant template systems) are exposed to information disclosure of sensitive prototype properties such as API keys and tokens. This vulnerability is fixed in 10.25.4. | |
| Title | LiquidJS has an ownPropertyOnly bypass via sort_natural filter — prototype property information disclosure through sorting side-channel | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T13:53:27.859Z
Reserved: 2026-04-07T00:23:30.595Z
Link: CVE-2026-39412
Updated: 2026-04-09T13:53:13.828Z
Status : Analyzed
Published: 2026-04-08T20:16:25.733
Modified: 2026-04-20T14:53:53.790
Link: CVE-2026-39412
No data.
OpenCVE Enrichment
Updated: 2026-04-20T19:00:10Z
Github GHSA