CVE-2026-33154
HIGHdynaconf Affected by Remote Code Execution (RCE) via Insecure Template Evaluation in @jinja Resolver
Title source: cnaDescription
dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaconf evaluates template expressions embedded in configuration values without a sandboxed environment. This issue has been patched in version 3.2.13.
Exploits (1)
Scores
CVSS v3
7.5
EPSS
0.0002
EPSS Percentile
5.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-1336
CWE-78
CWE-94
Status
published
Products (2)
dynaconf/dynaconf
< 3.2.13 (2 CPE variants)
pypi/dynaconf
0 - 3.2.13PyPI
Published
Mar 20, 2026
Tracked Since
Mar 21, 2026