CVE-2026-25526

CRITICAL

JinJava <2.7.6, <2.8.3 - RCE

Title source: llm

Description

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

Exploits (2)

github STUB 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25526
nomisec WORKING POC
by av4nth1ka · poc
https://github.com/av4nth1ka/jinjava-cve-2026-25526-poc

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 12.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-1336
Status published
Products (2)
com.hubspot.jinjava/jinjava 2.8.0 - 2.8.3Maven
hubspot/jinjava < 2.7.6
Published Feb 04, 2026
Tracked Since Feb 18, 2026