Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1686: External Control of File Name or Path in io.pebbletemplates:pebble

0
Medium
VulnerabilityCVE-2025-1686cvecve-2025-1686
Published: Thu Feb 27 2025 (02/27/2025, 05:00:05 UTC)
Source: CVE Database V5
Product: io.pebbletemplates:pebble

Description

All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();

AI-Powered Analysis

AILast updated: 12/19/2025, 16:28:50 UTC

Technical Analysis

CVE-2025-1686 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting all versions of the io.pebbletemplates:pebble package. The flaw arises from the unsafe handling of the include tag within Pebble Templates, which allows an attacker with high privileges to craft malicious templates that include arbitrary local files on the server. This can lead to unauthorized disclosure of sensitive system files such as /etc/passwd or environment files like /proc/1/environ, potentially exposing system configuration, user credentials, or environment variables. The vulnerability does not require user interaction and can be exploited remotely over the network, given the attacker has high privileges on the system. The CVSS 4.0 base score is 6.1, indicating a medium severity with network attack vector, low attack complexity, no privileges required for attack initiation but high privileges needed for exploitation, and no user interaction. The vulnerability can be mitigated by disabling the include macro in the Pebble template engine using the provided Java code snippet that disallows the include tag via an extension customizer. No official patches are listed, so disabling the include tag is the primary workaround. No known exploits have been reported in the wild, but the vulnerability poses a risk of local file disclosure in affected applications.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive local files, which may contain critical system information, user data, or environment variables. This could facilitate further attacks such as privilege escalation, lateral movement, or targeted data theft. Organizations using Java-based web applications or services that incorporate the Pebble templating engine are at risk, especially if these applications process user-controlled templates or notifications. The impact is heightened in environments where attackers already have high privileges, such as compromised internal systems or privileged insiders. Confidentiality is primarily affected, with potential indirect impacts on integrity and availability if attackers leverage disclosed information for further exploitation. The vulnerability could affect sectors with critical infrastructure or sensitive data, including finance, healthcare, and government services across Europe.

Mitigation Recommendations

European organizations should first inventory their software to identify any usage of the io.pebbletemplates:pebble package. If found, they should immediately implement the recommended workaround by disabling the include macro in Pebble Templates using the provided Java code snippet to disallow the include tag. Additionally, organizations should restrict high privilege access to the systems running Pebble templates to minimize the risk of exploitation. Monitoring and logging template rendering activities can help detect attempts to exploit this vulnerability. Where possible, upgrade to a patched version once available or apply vendor patches promptly. Conduct code reviews to ensure that template inputs are properly sanitized and that no untrusted user input can influence template rendering. Finally, implement defense-in-depth controls such as file system access restrictions and application sandboxing to limit the impact of any successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2025-02-25T10:32:01.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694579a3133fda1465c274c1

Added to database: 12/19/2025, 4:13:23 PM

Last enriched: 12/19/2025, 4:28:50 PM

Last updated: 12/20/2025, 2:25:58 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats