๐Ÿ” CVE Alert

CVE-2026-29514

HIGH 8.8

NetBox 4.3.5 - 4.5.4 RCE via RenderTemplateMixin

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the environment_params field. Attackers can bypass Jinja2 SandboxedEnvironment protections by setting the finalize parameter to any importable Python callable such as subprocess.getoutput, which is invoked on every rendered expression outside the sandbox's call interception mechanism, achieving remote code execution as the NetBox service user.

CWE CWE-183
Vendor netbox-community
Product netbox
Published May 4, 2026
Last Updated May 4, 2026
Stay Ahead of the Next One

Get instant alerts for netbox-community netbox

Be the first to know when new high vulnerabilities affecting netbox-community netbox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

netbox-community / netbox
4.3.5 โ‰ค 4.5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
chocapikk.com: https://chocapikk.com/posts/2026/netbox-export-template-rce/ github.com: https://github.com/netbox-community/netbox/issues/22079 github.com: https://github.com/netbox-community/netbox/pull/22078 vulncheck.com: https://www.vulncheck.com/advisories/netbox-rce-via-rendertemplatemixin

Credits

Valentin Lobstein (Chocapikk)