| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|
| templated_dictionary | pip | < 1.4.1 | 1.4.1 |
The vulnerability stems from improper sandboxing during Jinja2 template rendering. The __render_string method directly renders user-controlled template content using a SandboxedEnvironment but provides the entire object's dict as the context. This exposes internal variables and potentially dangerous methods to template authors. Combined with the lack of strict input validation (CWE-20), attackers could craft templates that execute arbitrary code via the exposed context. The patch moved the sandbox to a shared instance, but the critical flaw was the unsafe context passing in this function.
KEV Misses 88% of Exploited CVEs- Get the report