Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks

HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks

Posted on September 19, 2025September 19, 2025 By CWS

A newly disclosed flaw in HubSpot’s open-source Jinjava template engine may permit attackers to bypass sandbox restrictions and obtain distant code execution (RCE) on 1000’s of internet sites counting on variations previous to 2.8.1. 

Tracked as CVE-2025-59340 and rated Important with a CVSS v3.1 rating of 10.0, the difficulty stems from JavaType‐primarily based deserialization, enabling risk actors to instantiate arbitrary lessons regardless of current protections.

Jinjava Sandbox Escape

Jinjava’s sandbox is designed to dam harmful calls like getClass() and forbid direct instantiation of Class objects. 

Nevertheless, safety researchers found that by accessing the built-in ____int3rpr3t3r____ variable, which exposes the energetic JinjavaInterpreter occasion, an attacker can navigate to the interior ObjectMapper and invoke its unrestricted readValue methodology. 

Attackers can deserialize attacker-controlled enter into cases like java.internet.URL and skim native recordsdata. 

As a result of JavaType building shouldn’t be blacklisted, the sandbox escape permits the instantiation of semi-arbitrary lessons. This primitive opens paths for full SSRF, arbitrary file reads, and—when chained with further devices—RCE.

Manufacturing functions integrating Jinjava by way of Maven coordinates com.hubspot.jinjava:jinjava in variations older than 2.8.1 are weak. 

Hundreds of content material administration programs, e-mail template renderers, and customized net functions that make use of dynamic template rendering could also be in danger. 

Exploitation requires no person interplay and carries a Community assault vector with Low complexity and no privileges required.

Danger FactorsDetailsAffected Productscom.hubspot.jinjava:jinjava (ImpactSandbox escape, arbitrary file reads, SSRF, potential distant code executionExploit PrerequisitesNetwork entry; no privileges; no person interactionCVSS 3.1 Score9.8 (Important)

Mitigation

To deal with the difficulty, HubSpot launched jinjava 2.8.1, which provides specific restrictions on JavaType utilization, blocking constructFromCanonical for untrusted inputs and reinforcing the blacklist in JinjavaBeanELResolver. 

Directors are urged to improve instantly and audit template code for any direct or oblique use of ____int3rpr3t3r____.

Safety groups also needs to assessment their dependency graphs for different libraries exposing Jackson’s ObjectMapper with out enough sort restrictions. 

Implementing strict enter validation, disabling default typing the place possible, and making use of runtime instrumentation to detect suspicious deserialization calls can additional harden defenses towards related template engine bypasses.

By proactively patching and tightening sandbox controls, organizations can stop unauthorized file entry, SSRF, and potential RCE stemming from deserialization chains in Jinjava.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attacks, Engine, Exposes, HubSpots, Jinjava, RCE, Thousands, Vulnerability, Websites

Post navigation

Previous Post: New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware
Next Post: Netskope Raises Over $908 Million in IPO

Related Posts

Top 10 Best Deception Tools in 2025 Top 10 Best Deception Tools in 2025 Cyber Security News
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Cyber Security News
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Cyber Security News
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark