Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jinja2@2.11.3-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/jinja2@2.11.3-1%2Bdeb11u3?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-23hx-apt2-77bn Jinja2 vulnerable to sandbox breakout through attr filter selecting format method An oversight in how the Jinja sandboxed environment interacts with the `|attr` filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to use the `|attr` filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the `|attr` filter no longer bypasses the environment's attribute lookup. CVE-2025-27516
GHSA-cpwx-vrp4-4pq7
VCID-8vr3-83b4-hqd2 Jinja has a sandbox breakout through indirect reference to format method An oversight in how the Jinja sandboxed environment detects calls to `str.format` allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's `format` method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. CVE-2024-56326
GHSA-q2x7-8rv6-6q7h

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:50:32.816026+00:00 Debian Importer Fixing VCID-8vr3-83b4-hqd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:35.502080+00:00 Debian Importer Fixing VCID-23hx-apt2-77bn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:48:47.729971+00:00 Debian Importer Fixing VCID-8vr3-83b4-hqd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:38.947705+00:00 Debian Importer Fixing VCID-23hx-apt2-77bn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:53.001234+00:00 Debian Importer Fixing VCID-23hx-apt2-77bn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:52.942286+00:00 Debian Importer Fixing VCID-8vr3-83b4-hqd2 https://security-tracker.debian.org/tracker/data/json 38.1.0