DEBIAN-CVE-2026-33940

Source
https://security-tracker.debian.org/tracker/CVE-2026-33940
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33940.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-33940
Upstream
Published
2026-03-27T22:16:21.030Z
Modified
2026-04-03T06:00:19.550037Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in resolvePartial() and cause invokePartial() to return undefined. The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to env.compile(). Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (require('handlebars/runtime')). Without compile(), the fallback compilation path in invokePartial is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups ({{> (lookup ...)}}) when context data is user-controlled.

References

Affected packages

Debian:11 / node-handlebars

Package

Name
node-handlebars
Purl
pkg:deb/debian/node-handlebars?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3:4.*
3:4.7.6+~4.1.0-2
3:4.7.6+~4.1.0-3
3:4.7.7+~4.1.0-1
3:4.7.9-1
3:4.7.9-2
3:4.7.9-3
3:4.7.9-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33940.json"

Debian:12 / node-handlebars

Package

Name
node-handlebars
Purl
pkg:deb/debian/node-handlebars?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3:4.*
3:4.7.7+~4.1.0-1
3:4.7.9-1
3:4.7.9-2
3:4.7.9-3
3:4.7.9-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33940.json"

Debian:13 / node-handlebars

Package

Name
node-handlebars
Purl
pkg:deb/debian/node-handlebars?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3:4.*
3:4.7.7+~4.1.0-1
3:4.7.9-1
3:4.7.9-2
3:4.7.9-3
3:4.7.9-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33940.json"

Debian:14 / node-handlebars

Package

Name
node-handlebars
Purl
pkg:deb/debian/node-handlebars?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:4.7.9-1

Affected versions

3:4.*
3:4.7.7+~4.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33940.json"