File Inclusion Vulnerability in Pebble Templates by PebbleTemplates
CVE-2025-1686

6.1MEDIUM

Key Information:

Vendor
PebbleTemplates
Status
Io.pebbletemplates:pebble
Vendor
CVE Published:
27 February 2025

Summary

The package io.pebbletemplates:pebble is subject to a vulnerability that allows high-privileged attackers to exploit the 'include' tag. By creating specific malicious notification templates, attackers can gain unauthorized access to sensitive local files, such as /etc/passwd or /proc/1/environ. This poses a significant risk as attackers can leverage this flaw to manipulate file inclusions in a way that can expose confidential information. To mitigate this issue, it is recommended to disable the include macro in Pebble Templates.

Affected Version(s)

io.pebbletemplates:pebble 0

References

CVSS V4

Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonathan Leitschuh
.