Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-1686
PUBLISHED
More InfoOfficial Page
Assigner-snyk
Assigner Org ID-bae035ff-b466-4ff4-94d0-fc9efd9e1730
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2025 | 05:00
Updated At-19 Apr, 2026 | 07:54
Rejected At-
▼CVE Numbering Authority (CNA)

Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();

Affected Products
Vendor
n/a
Product
io.pebbletemplates:pebble
Versions
Affected
  • From 0 before 4.1.0 (semver)
Problem Types
TypeCWE IDDescription
N/AN/AExternal Control of File Name or Path
Type: N/A
CWE ID: N/A
Description: External Control of File Name or Path
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P
4.06.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:P
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:P
Version: 4.0
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Jonathan Leitschuh
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
N/A
https://github.com/PebbleTemplates/pebble/issues/680
N/A
https://pebbletemplates.io/wiki/tag/include
N/A
https://github.com/PebbleTemplates/pebble/issues/688
N/A
https://github.com/PebbleTemplates/pebble/commit/b3451c8f305a1a248fbcc2363fd307d0baaee329
N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
Resource: N/A
Hyperlink: https://github.com/PebbleTemplates/pebble/issues/680
Resource: N/A
Hyperlink: https://pebbletemplates.io/wiki/tag/include
Resource: N/A
Hyperlink: https://github.com/PebbleTemplates/pebble/issues/688
Resource: N/A
Hyperlink: https://github.com/PebbleTemplates/pebble/commit/b3451c8f305a1a248fbcc2363fd307d0baaee329
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-73CWE-73 External Control of File Name or Path
Type: CWE
CWE ID: CWE-73
Description: CWE-73 External Control of File Name or Path
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
exploit
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
Resource:
exploit
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/PebbleTemplates/pebble/pull/715
N/A
Hyperlink: https://github.com/PebbleTemplates/pebble/pull/715
Resource: N/A
Details not found