jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1.

Project Subscriptions

Vendors Products
Hubspot Subscribe
Jinjava Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-29780 jinjava has Sandbox Bypass via JavaType-Based Deserialization
Github GHSA Github GHSA GHSA-m49c-g9wr-hv6v jinjava has Sandbox Bypass via JavaType-Based Deserialization
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 25 Sep 2025 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hubspot:jinjava:*:*:*:*:*:*:*:*

Thu, 18 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Sep 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Hubspot
Hubspot jinjava
Vendors & Products Hubspot
Hubspot jinjava

Wed, 17 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Description jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1.
Title jinjava Sandbox Bypass via JavaType-Based Deserialization
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-18T15:45:23.121Z

Reserved: 2025-09-12T12:36:24.635Z

Link: CVE-2025-59340

cve-icon Vulnrichment

Updated: 2025-09-18T15:45:20.541Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-17T20:15:36.430

Modified: 2025-09-26T13:11:40.227

Link: CVE-2025-59340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-18T11:58:51Z

Weaknesses