CVE-2026-25526 PUBLISHED

JinJava Bypass through ForTag leads to Arbitrary Java Execution

Assigner: GitHub_M
Reserved: 02.02.2026 Published: 04.02.2026 Updated: 04.02.2026

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor HubSpot
Product jinjava
Versions
  • Version < 2.7.6 is affected
  • Version < 2.8.3 is affected

References

Problem Types

  • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine CWE