Description
Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();
INFO
Published Date :
2025-02-27T05:00:05.848Z
Last Modified :
2026-04-19T07:54:57.303Z
Source :
snyk
AFFECTED PRODUCTS
The following products are affected by CVE-2025-1686 vulnerability.
| Vendors | Products |
|---|---|
| Pebbletemplates |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-1686.