jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
13 Jan 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/casid/jte/security/advisories/GHSA-vh22-6c6h-rm8q - |
13 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-13 20:15
Updated : 2025-01-13 21:15
NVD link : CVE-2025-23026
Mitre link : CVE-2025-23026
CVE.ORG link : CVE-2025-23026
JSON object : View
Products Affected
No product.