Metrics
Affected Vendors & Products
Wed, 09 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift
|
|
CPEs | cpe:/a:redhat:openshift:4.14::el8 | |
Vendors & Products |
Redhat openshift
|
Tue, 08 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_aus:8.2 |
Mon, 07 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_tus:8.6 |
Fri, 04 Apr 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Aus
Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:rhdh:1.4::el9 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_tus:8.4 |
|
Vendors & Products |
Redhat rhel Aus
Redhat rhel Tus |
Wed, 02 Apr 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhdh
|
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhdh:1.5::el9 |
|
Vendors & Products |
Redhat rhdh
|
Fri, 28 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openstack
|
|
CPEs | cpe:/a:redhat:openstack:17.1::el9 | |
Vendors & Products |
Redhat openstack
|
Wed, 26 Mar 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9 |
Tue, 25 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.4::el9 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 |
|
Vendors & Products |
Redhat enterprise Linux
|
Wed, 19 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel E4s
|
|
CPEs | cpe:/a:redhat:rhel_e4s:9.0 | |
Vendors & Products |
Redhat rhel E4s
|
Thu, 13 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
Vendors & Products |
Redhat rhel Eus
|
Wed, 12 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat ansible Automation Platform |
|
CPEs | cpe:/a:redhat:ansible_automation_platform:ee::el8 | |
Vendors & Products |
Redhat
Redhat ansible Automation Platform |
Thu, 06 Mar 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 05 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6. | |
Title | Jinja sandbox breakout through attr filter selecting format method | |
Weaknesses | CWE-1336 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-05T20:53:46.111Z
Reserved: 2025-02-26T18:11:52.307Z
Link: CVE-2025-27516

Updated: 2025-03-05T20:53:36.247Z

Status : Received
Published: 2025-03-05T21:15:20.073
Modified: 2025-03-05T21:15:20.073
Link: CVE-2025-27516
