-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper handling of 'unsafe' markers during templating operations. The patched functions all show modifications where unsafe data processing was strengthened by adding _strip_unsafe calls or blocking unsafe method execution. These functions directly handle template rendering, serialization, and conditional evaluation - the key areas where unsafe designation could be lost per CVE-2023-5764's description. The commit diffs demonstrate explicit security fixes in these specific functions across JSON/YAML serialization paths and template evaluation logic.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ansible-core | pip | >= 2.16.0, < 2.16.1 | 2.16.1 |
| ansible-core | pip | >= 2.15.0, < 2.15.8 | 2.15.8 |
| ansible-core | pip |
| < 2.14.12 |
| 2.14.12 |
Ongoing coverage of React2Shell