CVE-2023-2142

In Nunjucks versions prior to version 3.2.4, it was possible to bypass the restrictions which are provided by the autoescape functionality. If there are two user-controlled parameters on the same line used in the views, it was possible to inject cross site scripting payloads using the backslash \ character.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:nunjucks:*:*:*:*:*:*:*:*

History

24 Jun 2025, 16:42

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:nunjucks:*:*:*:*:*:*:*:*
First Time Mozilla
Mozilla nunjucks
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1825980 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1825980 - Issue Tracking, Permissions Required
References () https://github.com/mozilla/nunjucks/security/advisories/GHSA-x77j-w7wf-fjmw - () https://github.com/mozilla/nunjucks/security/advisories/GHSA-x77j-w7wf-fjmw - Vendor Advisory

Information

Published : 2024-11-26 12:15

Updated : 2025-06-24 16:42


NVD link : CVE-2023-2142

Mitre link : CVE-2023-2142

CVE.ORG link : CVE-2023-2142


JSON object : View

Products Affected

mozilla

  • nunjucks
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')