Versions of the package io.pebbletemplates:pebble from 0 and before 4.1.0 are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();
https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
https://pebbletemplates.io/wiki/tag/include
https://github.com/PebbleTemplates/pebble/pull/715
https://github.com/PebbleTemplates/pebble/issues/688
https://github.com/PebbleTemplates/pebble/issues/680
https://github.com/PebbleTemplates/pebble/commit/b3451c8f305a1a248fbcc2363fd307d0baaee329
Published: 2025-02-27
Updated: 2026-04-19
Base Score: 6.1
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:N/A:N
Severity: Medium
Base Score: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
Base Score: 6.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
Severity: Medium
EPSS: 0.00048