Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the environment_params field. Attackers can bypass Jinja2 SandboxedEnvironment protections by setting the finalize parameter to any importable Python callable such as subprocess.getoutput, which is invoked on every rendered expression outside the sandbox's call interception mechanism, achieving remote code execution as the NetBox service user. | |
| Title | NetBox 4.3.5 - 4.5.4 RCE via RenderTemplateMixin | |
| Weaknesses | CWE-183 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-04T16:59:25.855Z
Reserved: 2026-03-04T15:39:26.872Z
Link: CVE-2026-29514
Updated: 2026-05-04T16:59:20.436Z
Status : Received
Published: 2026-05-04T17:16:22.880
Modified: 2026-05-04T17:16:22.880
Link: CVE-2026-29514
No data.
OpenCVE Enrichment
Updated: 2026-05-04T17:30:04Z