JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
JinJava Bypass through ForTag leads to Arbitrary Java Execution
Problem type
Affected products
HubSpot
< 2.7.6 - AFFECTED
< 2.8.3 - AFFECTED
References
https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74
https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998
https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441
https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6
https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3
GitHub Security Advisories
GHSA-gjx9-j8f8-7j74
JinJava Bypass through ForTag leads to Arbitrary Java Execution
https://github.com/advisories/GHSA-gjx9-j8f8-7j74Impact
Vulnerability Type: Sandbox Bypass / Remote Code Execution
Affected Component: Jinjava
Affected Users:
- Organizations using HubSpot's Jinjava template rendering engine for user-provided template content
- Any system that renders untrusted Jinja templates using HubSpot's Jinjava implementation
- Users with the ability to create or edit custom code templates
Severity: Critical - allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions
Root Cause: Multiple security bypass vulnerabilities in Jinjava's sandbox mechanism:
ForTag Property Access Bypass: The
ForTagclass does not enforceJinjavaBeanELResolverrestrictions when iterating over object properties usingIntrospector.getBeanInfo()and invoking getter methods viaPropertyDescriptor.getReadMethod()Restricted Class Instantiation: The sandbox's type allowlist can be bypassed by using ObjectMapper to instantiate classes through JSON deserialization, including creating new
JinjavaELContextandJinjavaConfiginstances
Attack Vector: An attacker with the ability to create or edit Jinja templates can:
- Access arbitrary getter methods on objects in the template context
- Instantiate
ObjectMapperto enable default typing - Create arbitrary Java classes by bypassing type allowlists
- Read files from the server filesystem (demonstrated with
/etc/passwd) - Potentially execute arbitrary code
Patches
Status: Patched - CVE-2026-25526
Users should upgrade to one of the following versions which contain fixes for this vulnerability:
- JinJava 2.8.3 or later
- JinJava 2.7.6 or later
Fix Components:
ForTag Security Hardening
- Added security checks to
ForTag.renderForCollection()to enforceJinjavaBeanELResolverrestrictions - Implemented property access validation against restricted properties/methods before invoking getter methods
- Added checks for restricted class types before introspection
- Added security checks to
Enhanced Type Validation
- Improved validation in
JinjavaBeanELResolver.isRestrictedClass()to prevent instantiation of sensitive types - Added additional restricted types to the denylist
- Implemented deeper validation for types created via ObjectMapper deserialization
- Improved validation in
Configuration Protection
- Added checks to prevent creation of new
JinjavaConfigorJinjavaELContextinstances via ObjectMapper - Prevented modification of
readOnlyResolverconfiguration from untrusted templates - Implemented additional safeguards around ELResolver configuration
- Added checks to prevent creation of new
Collection Type Validation
- Implemented proper type validation in
HubLELResolverto prevent collection type wrapping bypasses - Added checks for wrapped types in collection deserialization
- Implemented validation for all types within collections against allowlists
- Implemented proper type validation in
ObjectMapper Restrictions
- Added additional restrictions on
ObjectMapper.enableDefaultTyping()to prevent enabling via less restrictive ELResolver - Ensured default typing cannot be enabled without proper authorization
- Added additional restrictions on
Information for Users: Upgrade to version 2.8.3 or 2.7.6 or later to address this vulnerability.
References
Project Resources
- Jinjava Source Code: github.com/HubSpot/jinjava
- Jinjava Releases: github.com/HubSpot/jinjava/releases
Security Standards & Classifications
- CWE-502: Deserialization of Untrusted Data
- CWE-913: Improper Control of Dynamically-Managed Code Resources
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CVSS v3.1: Common Vulnerability Scoring System
Additional Resources
https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74
https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998
https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441
https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6
https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3
https://github.com/advisories/GHSA-gjx9-j8f8-7j74
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-25526Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-25526",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-02-04T21:26:58.572Z",
"dateReserved": "2026-02-02T19:59:47.372Z",
"datePublished": "2026-02-04T21:26:58.572Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-02-04T21:26:58.572Z"
},
"title": "JinJava Bypass through ForTag leads to Arbitrary Java Execution",
"descriptions": [
{
"lang": "en",
"value": "JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3."
}
],
"affected": [
{
"vendor": "HubSpot",
"product": "jinjava",
"versions": [
{
"version": "< 2.7.6",
"status": "affected"
},
{
"version": "< 2.8.3",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine",
"cweId": "CWE-1336",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74",
"name": "https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998",
"name": "https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441",
"name": "https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6",
"name": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3",
"name": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
}
}
]
}
}
}