{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T22:47:06.523","vulnerabilities":[{"cve":{"id":"CVE-2026-30952","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T21:16:48.187","lastModified":"2026-03-18T19:16:25.620","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.0, the layout, render, and include tags allow arbitrary file access via absolute paths (either as string literals or through Liquid variables, the latter require dynamicPartials: true, which is the default). This poses a security risk when malicious users are allowed to control the template content or specify the filepath to be included as a Liquid variable. This vulnerability is fixed in 10.25.0."},{"lang":"es","value":"liquidjs es un motor de plantillas compatible con Shopify / GitHub Pages en JavaScript puro. Antes de la versión 10.25.0, las etiquetas layout, render e include permiten el acceso arbitrario a archivos a través de rutas absolutas (ya sea como literales de cadena o a través de variables Liquid; estas últimas requieren dynamicPartials: true, que es el valor predeterminado). Esto plantea un riesgo de seguridad cuando se permite a usuarios malintencionados controlar el contenido de la plantilla o especificar la ruta del archivo a incluir como una variable Liquid. Esta vulnerabilidad se corrige en la versión 10.25.0."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liquidjs:liquidjs:*:*:*:*:*:node.js:*:*","versionEndExcluding":"10.25.0","matchCriteriaId":"7C54ABF9-1200-4609-BCB2-92D48A591012"}]}]}],"references":[{"url":"https://github.com/harttle/liquidjs/commit/3cd024d652dc883c46307581e979fe32302adbac","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/harttle/liquidjs/pull/851","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/harttle/liquidjs/pull/855","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/harttle/liquidjs/security/advisories/GHSA-wmfp-5q7x-987x","source":"security-advisories@github.com","tags":["Mitigation","Patch","Vendor Advisory"]}]}}]}