CVE-2024-36361

Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.
Configurations

No configuration.

History

No history.

Information

Published : 2024-05-24 06:15

Updated : 2024-07-03 02:03


NVD link : CVE-2024-36361

Mitre link : CVE-2024-36361

CVE.ORG link : CVE-2024-36361


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')