CVE-2026-25526
CRITICALJinJava <2.7.6, <2.8.3 - RCE
Title source: llmDescription
JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
Exploits (2)
github
STUB
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25526
References (5)
Scores
CVSS v3
9.8
EPSS
0.0004
EPSS Percentile
12.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-1336
Status
published
Products (2)
com.hubspot.jinjava/jinjava
2.8.0 - 2.8.3Maven
hubspot/jinjava
< 2.7.6
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026