All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.
Workaround
This vulnerability can be mitigated by disabling the include macro in Pebble Templates:
java
new PebbleEngine.Builder()
.registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()
.disallowedTokenParserTags(List.of("include"))
.build())
.build();
Metrics
Affected Vendors & Products
References
History
Mon, 07 Apr 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pebbletemplates
Pebbletemplates pebble |
|
CPEs | cpe:2.3:a:pebbletemplates:pebble:*:*:*:*:*:*:*:* | |
Vendors & Products |
Pebbletemplates
Pebbletemplates pebble |
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 27 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | io.pebbletemplates:pebble: Path Traversal Vulnerability in Pebble Templates | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 27 Feb 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build(); | |
Weaknesses | CWE-73 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-27T14:44:57.552Z
Reserved: 2025-02-25T10:32:01.608Z
Link: CVE-2025-1686

Updated: 2025-02-27T14:44:39.962Z

Status : Analyzed
Published: 2025-02-27T05:15:14.143
Modified: 2025-04-07T18:29:22.970
Link: CVE-2025-1686
