CVE-2026-30952
liquidjs has a path traversal fallback vulnerability
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.0, the layout, render, and include tags allow arbitrary file access via absolute paths (either as string literals or through Liquid variables, the latter require dynamicPartials: true, which is the default). This poses a security risk when malicious users are allowed to control the template content or specify the filepath to be included as a Liquid variable. This vulnerability is fixed in 10.25.0.
| CWE | CWE-22 |
| Vendor | harttle |
| Product | liquidjs |
| Published | Mar 10, 2026 |
| Last Updated | Mar 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for harttle liquidjs
Be the first to know when new unknown vulnerabilities affecting harttle liquidjs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
harttle / liquidjs
< 10.25.0