CVE-2025-1686
MEDIUMio.pebbletemplates:pebble - Path Traversal
Title source: llmDescription
Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();
Scores
CVSS v3
6.8
EPSS
0.0026
EPSS Percentile
49.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Details
CWE
CWE-73
Status
published
Products (3)
None/io.pebbletemplates:pebble
< 4.1.0
io.pebbletemplates/pebble
0Maven
pebbletemplates/pebble
Published
Feb 27, 2025
Tracked Since
Feb 18, 2026