๐Ÿ” CVE Alert

CVE-2026-41311

HIGH 7.5

LiquidJS is vulnerable to Denial of Service via circular block reference in layout

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.7, a circular block reference in {% layout %} / {% block %} causes an infinite recursive loop, consuming all available memory (~4GB) and crashing the Node.js process with FATAL ERROR: JavaScript heap out of memory. This allows any user who can submit a Liquid template to perform a Denial of Service attack. This issue has been patched in version 10.25.7.

CWE CWE-674
Vendor harttle
Product liquidjs
Published May 9, 2026
Stay Ahead of the Next One

Get instant alerts for harttle liquidjs

Be the first to know when new high vulnerabilities affecting harttle liquidjs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

harttle / liquidjs
< 10.25.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/harttle/liquidjs/security/advisories/GHSA-4rc3-7j7w-m548 github.com: https://github.com/harttle/liquidjs/commit/e2311dfd6e82f73509308aa8a3a1fafc92e226f0 github.com: https://github.com/harttle/liquidjs/releases/tag/v10.25.7