Miggo Logo

CVE-2025-23026: jte's HTML templates containing Javascript template strings are subject to XSS

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.1239%
Published
1/13/2025
Updated
1/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
gg.jte:jtemaven<= 3.1.153.1.16
gg.jte:jte-runtimemaven<= 3.1.153.1.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two methods in the Escape class handling JavaScript contexts. The commit diff shows these functions lacked escaping for backticks (used in JS template literals) and dollar signs (used in template interpolation). This matches the CWE-79/CWE-150 descriptions and the PoC demonstrating XSS via unescaped template strings. The high confidence comes from direct references in vulnerability details, commit patches adding specific escaping logic, and test cases validating these fixes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Jt* *TML t*mpl*t*s wit* `s*ript` t**s or s*ript *ttri*ut*s t**t in*lu** * J*v*s*ript t*mpl*t* strin* (***kti*ks) *r* su*j**t to XSS. ### **t*ils T** `j*v*S*ript*lo*k` *n* `j*v*S*ript*ttri*ut*` m*t*o*s in t** `*s**p*` *l*ss ([sour**](*ttp

Reasoning

T** vuln*r**ility st*ms *rom two m*t*o*s in t** `*s**p*` *l*ss **n*lin* J*v*S*ript *ont*xts. T** *ommit *i** s*ows t**s* *un*tions l**k** *s**pin* *or ***kti*ks (us** in JS t*mpl*t* lit*r*ls) *n* *oll*r si*ns (us** in t*mpl*t* int*rpol*tion). T*is m*
CVE-2025-23026: Jte JS Template String XSS | Miggo