-
CVSS Score
-The vulnerability stemmed from using jinja2.Environment instead of SandboxedEnvironment. The commit diff shows the patching involved switching to SandboxedEnvironment, which restricts access to unsafe operations. The original Environment implementation allowed template authors to traverse object hierarchies (via class, mro, subclasses) to reach dangerous functions, as demonstrated in the POC using subprocess.Popen for RCE.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| document-merge-service | pip | < 6.5.2 | 6.5.2 |
A Semantic Attack on Google Gemini - Read the Latest Research