| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c9ph-gxww-7744 | Sandboxed Thymeleaf expressions vulnerable to improper recognition of unauthorized syntax patterns |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thymeleaf
Thymeleaf thymeleaf |
|
| Vendors & Products |
Thymeleaf
Thymeleaf thymeleaf |
Tue, 12 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Thymeleaf is a server-side Java template engine for web and standalone environments. Prior to 3.1.5.RELEASE, a security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf. Although the library provides mechanisms to avoid the execution of potentially dangerous expressions in some specific sandboxed (restricted) contexts, it fails to properly neutralize specific constructs that allow this kind of expressions to be executed. If an application developer passes to the template engine unsanitized variables that contain such expressions, and these values are used in sandboxed contexts inside the templates, these expressions can be executed achieving Server-Side Template Injection (SSTI). This vulnerability is fixed in 3.1.5.RELEASE. | |
| Title | Thymeleaf: Improper recognition of unauthorized syntax patterns in sandboxed Thymeleaf expressions | |
| Weaknesses | CWE-1336 CWE-917 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T12:08:38.767Z
Reserved: 2026-04-22T15:11:54.672Z
Link: CVE-2026-41901
Updated: 2026-05-13T12:08:30.702Z
Status : Deferred
Published: 2026-05-12T23:16:17.060
Modified: 2026-05-13T16:10:57.817
Link: CVE-2026-41901
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:15:27Z
Github GHSA