Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4rc3-7j7w-m548 | liquidjs has a Denial of Service via circular block reference in layout |
Thu, 14 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Liquidjs
Liquidjs liquidjs |
|
| CPEs | cpe:2.3:a:liquidjs:liquidjs:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Liquidjs
Liquidjs liquidjs |
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Harttle
Harttle liquidjs |
|
| Vendors & Products |
Harttle
Harttle liquidjs |
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.7, a circular block reference in {% layout %} / {% block %} causes an infinite recursive loop, consuming all available memory (~4GB) and crashing the Node.js process with FATAL ERROR: JavaScript heap out of memory. This allows any user who can submit a Liquid template to perform a Denial of Service attack. This issue has been patched in version 10.25.7. | |
| Title | LiquidJS is vulnerable to Denial of Service via circular block reference in layout | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T15:04:09.635Z
Reserved: 2026-04-20T14:01:46.671Z
Link: CVE-2026-41311
Updated: 2026-05-11T15:03:58.242Z
Status : Analyzed
Published: 2026-05-09T04:16:21.913
Modified: 2026-05-14T18:40:51.280
Link: CVE-2026-41311
No data.
OpenCVE Enrichment
Updated: 2026-05-09T05:30:16Z
Github GHSA