Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1686: External Control of File Name or Path in io.pebbletemplates:pebble

0
Medium
VulnerabilityCVE-2025-1686cvecve-2025-1686
Published: Thu Feb 27 2025 (02/27/2025, 05:00:05 UTC)
Source: CVE Database V5
Product: io.pebbletemplates:pebble

Description

All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();

AI-Powered Analysis

AILast updated: 12/26/2025, 16:33:16 UTC

Technical Analysis

CVE-2025-1686 affects all versions of the io.pebbletemplates:pebble package, a Java templating engine widely used for rendering dynamic content. The vulnerability arises from the 'include' tag functionality, which allows templates to include external files. Due to insufficient validation or sanitization of the file path input, an attacker with high privileges can craft malicious templates that exploit this tag to read arbitrary local files on the host system. Examples include sensitive system files like /etc/passwd or environment files such as /proc/1/environ, potentially exposing critical system information. The vulnerability is classified under CWE-73 (External Control of File Name or Path). The CVSS 4.0 score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no authentication required beyond high privileges, and no user interaction needed. The scope is high since local file disclosure can lead to information leakage and further attacks. Mitigation involves disabling the 'include' macro in the Pebble engine by customizing the extension to disallow the 'include' tag, effectively preventing the inclusion of arbitrary files. No patches are currently linked, and no exploits are known in the wild, but the risk remains significant in environments where high-privileged users can influence template content.

Potential Impact

For European organizations, the impact of CVE-2025-1686 depends on the deployment context of the Pebble templating engine. Organizations using Pebble in backend systems that process notifications or dynamic content with high-privileged access are at risk of sensitive local file disclosure. This can lead to leakage of system configuration, user credentials, or environment variables, potentially facilitating privilege escalation or lateral movement within networks. Critical sectors such as finance, healthcare, and government, which often handle sensitive data and rely on Java-based applications, could face increased risk. The vulnerability does not allow remote code execution directly but can aid attackers in reconnaissance and preparation for further attacks. The lack of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once the vulnerability is public. The medium severity rating suggests moderate urgency for remediation, but organizations with stringent data protection requirements under GDPR should prioritize mitigation to avoid data breaches and compliance violations.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately disable the 'include' macro in Pebble templates by applying the provided code snippet to disallow the 'include' tag, preventing exploitation of this vector. 2) Audit all template files and notification systems that utilize Pebble to identify any use of the 'include' tag and remove or replace it with safer alternatives. 3) Restrict template editing privileges to trusted, high-integrity users to prevent malicious template injection. 4) Monitor logs for unusual template rendering activities or attempts to include sensitive files. 5) Where possible, isolate the Pebble engine execution environment with least privilege principles to limit file system access. 6) Stay updated with vendor advisories for official patches or updates addressing this vulnerability. 7) Conduct penetration testing focusing on template injection and file inclusion vectors to validate mitigations. These steps go beyond generic advice by focusing on configuration changes, privilege management, and proactive detection tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2025-02-25T10:32:01.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694579a3133fda1465c274c1

Added to database: 12/19/2025, 4:13:23 PM

Last enriched: 12/26/2025, 4:33:16 PM

Last updated: 2/6/2026, 8:27:46 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats