File Inclusion Vulnerability in Pebble Templates by PebbleTemplates
CVE-2025-1686
6.1MEDIUM
Key Information:
- Vendor
- PebbleTemplates
- Status
- Io.pebbletemplates:pebble
- Vendor
- CVE Published:
- 27 February 2025
Summary
The package io.pebbletemplates:pebble is subject to a vulnerability that allows high-privileged attackers to exploit the 'include' tag. By creating specific malicious notification templates, attackers can gain unauthorized access to sensitive local files, such as /etc/passwd or /proc/1/environ. This poses a significant risk as attackers can leverage this flaw to manipulate file inclusions in a way that can expose confidential information. To mitigate this issue, it is recommended to disable the include macro in Pebble Templates.
Affected Version(s)
io.pebbletemplates:pebble 0
References
CVSS V4
Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jonathan Leitschuh