CVE-2025-3841
21.04.2025, 20:15
A vulnerability, which was classified as problematic, was found in wix-incubator jam up to e87a6fd85cf8fb5ff37b62b2d68f917219d07ae9. This affects an unknown part of the file jam.py of the component Jinja2 Template Handler. The manipulation of the argument config['template'] leads to improper neutralization of special elements used in a template engine. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
Vendor | Product | Version |
---|---|---|
wix | jam | 𝑥 < 2018-03-27 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-791 - Incomplete Filtering of Special ElementsThe software receives data from an upstream component, but does not completely filter special elements before sending it to a downstream component.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.