JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjx9-j8f8-7j74 | JinJava Bypass through ForTag leads to Arbitrary Java Execution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3. | |
| Title | JinJava Bypass through ForTag leads to Arbitrary Java Execution | |
| Weaknesses | CWE-1336 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T21:26:58.572Z
Reserved: 2026-02-02T19:59:47.372Z
Link: CVE-2026-25526
No data.
Status : Received
Published: 2026-02-04T22:15:59.510
Modified: 2026-02-04T22:15:59.510
Link: CVE-2026-25526
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA