{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:03:38.923","vulnerabilities":[{"cve":{"id":"CVE-2021-32818","sourceIdentifier":"security-advisories@github.com","published":"2021-05-14T19:15:07.880","lastModified":"2024-11-21T06:07:48.783","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025."},{"lang":"es","value":"haml-coffee es una solución de creación de plantillas de JavaScript.&#xa0;haml-coffee mezcla datos de plantilla puros con opciones de configuración del motor mediante la API de renderizado Express.&#xa0;Más específicamente, haml-coffee admite la incomprobación de una serie de funciones auxiliares de HTML mediante sus opciones de configuración.&#xa0;Una aplicación vulnerable que pasa objetos de petición controlados por el usuario al motor de plantilla haml-coffee puede introducir vulnerabilidades de RCE.&#xa0;Además, el control sobre el parámetro escapeHtml mediante la contaminación de la configuración de la plantilla asegura que haml-coffee no sanearía las entradas de la plantilla que pueden resultar en ataques de tipo Cross Site Scripting reflejado contra aplicaciones posteriores.&#xa0;Actualmente, no presenta una solución para estos problemas a partir de la publicación de este CVE.&#xa0;La última versión de haml-coffee es actualmente la versión 1.14.1.&#xa0;Para obtener detalles completos, consulte la referencia GHSL-2021-025"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:haml-coffee_project:haml-coffee:*:*:*:*:*:node.js:*:*","versionEndIncluding":"1.14.1","matchCriteriaId":"9889B578-A043-4600-A27A-6DE34478FD4B"}]}]}],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://www.npmjs.com/package/haml-coffee","source":"security-advisories@github.com","tags":["Exploit","Product"]},{"url":"https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.npmjs.com/package/haml-coffee","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Product"]}]}}]}