CVE-2025-1686
Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();
| CWE | CWE-73 |
| Vendor | n/a |
| Product | io.pebbletemplates:pebble |
| Published | Feb 27, 2025 |
| Last Updated | Apr 19, 2026 |
Get instant alerts for n/a io.pebbletemplates:pebble
Be the first to know when new medium vulnerabilities affecting n/a io.pebbletemplates:pebble are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P