Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xjw8-8c5c-9r79 | Improper neutralization of specific syntax patterns for unauthorized expressions in Thymeleaf |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:thymeleaf:thymeleaf:*:*:*:*:*:*:*:* |
Tue, 21 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thymeleaf
Thymeleaf org.thymeleaf:thymeleaf-spring5 Thymeleaf org.thymeleaf:thymeleaf-spring6 Thymeleaf thymeleaf |
|
| Vendors & Products |
Thymeleaf
Thymeleaf org.thymeleaf:thymeleaf-spring5 Thymeleaf org.thymeleaf:thymeleaf-spring6 Thymeleaf thymeleaf |
Fri, 17 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the the expression execution mechanisms. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions. If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library's protections to achieve Server-Side Template Injection (SSTI). This issue has ben fixed in version 3.1.4.RELEASE. | |
| Title | Improper neutralization of specific syntax patterns for unauthorized expressions in Thymeleaf | |
| Weaknesses | CWE-1336 CWE-917 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T03:55:42.682Z
Reserved: 2026-04-13T19:50:42.113Z
Link: CVE-2026-40478
Updated: 2026-04-20T16:17:07.750Z
Status : Analyzed
Published: 2026-04-17T22:16:33.650
Modified: 2026-04-24T16:58:33.957
Link: CVE-2026-40478
OpenCVE Enrichment
Updated: 2026-04-20T14:59:28Z
Github GHSA