Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30952: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in harttle liquidjs

0
High
VulnerabilityCVE-2026-30952cvecve-2026-30952cwe-22
Published: Tue Mar 10 2026 (03/10/2026, 20:25:20 UTC)
Source: CVE Database V5
Vendor/Project: harttle
Product: liquidjs

Description

liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.0, the layout, render, and include tags allow arbitrary file access via absolute paths (either as string literals or through Liquid variables, the latter require dynamicPartials: true, which is the default). This poses a security risk when malicious users are allowed to control the template content or specify the filepath to be included as a Liquid variable. This vulnerability is fixed in 10.25.0.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:59:22 UTC

Technical Analysis

CVE-2026-30952 is a path traversal vulnerability identified in the harttle liquidjs template engine, a JavaScript-based engine compatible with Shopify and GitHub Pages. Versions prior to 10.25.0 improperly restrict pathname inputs in the layout, render, and include tags, allowing attackers to specify absolute file paths. This flaw stems from CWE-22: Improper Limitation of a Pathname to a Restricted Directory. When dynamicPartials is enabled (default setting), Liquid variables can be used to dynamically specify file paths, which attackers can manipulate to access arbitrary files on the server filesystem. This can lead to unauthorized disclosure of sensitive data such as configuration files, source code, or credentials. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 4.0 score is 8.7 (high), reflecting the ease of exploitation and the critical confidentiality impact. The vulnerability was publicly disclosed in March 2026 and fixed in liquidjs version 10.25.0. No known exploits have been reported in the wild to date. The issue is particularly concerning for web applications that allow untrusted users to influence template content or file inclusion paths, as this can be leveraged for server-side information disclosure attacks.

Potential Impact

The primary impact of CVE-2026-30952 is unauthorized disclosure of sensitive files on servers running vulnerable versions of liquidjs. Attackers can read arbitrary files outside the intended template directories, potentially exposing secrets such as environment variables, private keys, database credentials, or proprietary source code. This compromises confidentiality and can facilitate further attacks like privilege escalation or lateral movement. Since the vulnerability requires no authentication or user interaction, it can be exploited by remote attackers with network access to the application. The integrity and availability of the system are not directly affected, but the breach of confidentiality can have severe business and compliance consequences. Organizations relying on liquidjs for e-commerce, content management, or static site generation are at risk, especially if they allow user-supplied template content or file paths. The widespread use of liquidjs in Shopify-compatible environments and GitHub Pages increases the global attack surface. Although no active exploits are known, the vulnerability’s high CVSS score and ease of exploitation make it a critical risk that demands prompt remediation.

Mitigation Recommendations

To mitigate CVE-2026-30952, organizations should immediately upgrade all liquidjs instances to version 10.25.0 or later, where the vulnerability is fixed. Additionally, restrict or sanitize any user input that can influence template file paths, especially when dynamicPartials is enabled. Disable dynamicPartials if dynamic file inclusion is not required. Implement strict allowlisting of template directories and enforce path normalization to prevent traversal sequences. Employ runtime monitoring and alerting for suspicious file access patterns. Conduct code reviews and security testing on templates that accept user input to ensure no arbitrary file inclusion is possible. For environments where upgrading is not immediately feasible, consider isolating the application with least privilege file system permissions to limit the impact of potential exploitation. Finally, maintain up-to-date backups and incident response plans to quickly recover from any compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b082c52f860ef943b7fd43

Added to database: 3/10/2026, 8:44:53 PM

Last enriched: 3/10/2026, 8:59:22 PM

Last updated: 3/14/2026, 2:08:49 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses