Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T03:37:04.700Z

Reserved:

Link: CVE-2024-36361

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:04.700Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-24T06:15:08.947

Modified: 2024-11-21T09:22:01.357

Link: CVE-2024-36361

cve-icon Redhat

No data.