๐Ÿ” CVE Alert

CVE-2025-1686

MEDIUM 6.8
CVSS Score
6.8
EPSS Score
0.2%
EPSS Percentile
42th

Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();

CWE CWE-73
Vendor n/a
Product io.pebbletemplates:pebble
Published Feb 27, 2025
Last Updated Apr 19, 2026
Stay Ahead of the Next One

Get instant alerts for n/a io.pebbletemplates:pebble

Be the first to know when new medium vulnerabilities affecting n/a io.pebbletemplates:pebble are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

n/a / io.pebbletemplates:pebble
0 < 4.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.snyk.io: https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594 github.com: https://github.com/PebbleTemplates/pebble/issues/680 pebbletemplates.io: https://pebbletemplates.io/wiki/tag/include github.com: https://github.com/PebbleTemplates/pebble/issues/688 github.com: https://github.com/PebbleTemplates/pebble/commit/b3451c8f305a1a248fbcc2363fd307d0baaee329 github.com: https://github.com/PebbleTemplates/pebble/pull/715

Credits

Jonathan Leitschuh