Description
Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1383 | Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers. |
Github GHSA |
GHSA-3965-hpx2-q597 | Pug allows JavaScript code execution if an application accepts untrusted input |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:18.755Z
Reserved: 2024-05-24T00:00:00.000Z
Link: CVE-2024-36361
Updated: 2024-08-02T03:37:04.700Z
Status : Deferred
Published: 2024-05-24T06:15:08.947
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-36361
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA