{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:53:58.950","vulnerabilities":[{"cve":{"id":"CVE-2025-23026","sourceIdentifier":"security-advisories@github.com","published":"2025-01-13T20:15:30.003","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability."},{"lang":"es","value":"jte (Java Template Engine) es un motor de plantillas ligero y seguro para Java y Kotlin. En las versiones afectadas, las plantillas HTML de Jte con etiquetas `Script` y atributos MASK13**ript que incluyen una cadena de plantilla de Javascript (comillas invertidas) están sujetas a XSS. Los métodos `javaScriptBlock` y `javaScriptAttribute` en la clase `Escape` no escapan las comillas invertidas, que se utilizan para cadenas de plantilla de Javascript. Los signos de dólar en las cadenas de plantilla también deben escaparse para evitar una interpolación no deseada. Las plantillas HTML renderizadas por `OwaspHtmlTemplateOutput` de Jte en versiones menores o iguales a `3.1.15Script `scriScriptgs o los atributos de script que contienen cadenas de plantilla de Javascript (comillas invertidas) son vulnerables. Se recomienda a los usuarios que actualicen a la versión 3.1.16 o posterior para resolver este problema. No se conocen Workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-150"}]}],"references":[{"url":"https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Template_literals#description","source":"security-advisories@github.com"},{"url":"https://github.com/casid/jte/blob/main/jte-runtime/src/main/java/gg/jte/html/escape/Escape.java#L43-L83","source":"security-advisories@github.com"},{"url":"https://github.com/casid/jte/security/advisories/GHSA-vh22-6c6h-rm8q","source":"security-advisories@github.com"},{"url":"https://github.com/casid/jte/security/advisories/GHSA-vh22-6c6h-rm8q","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}