{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T22:00:48.302","vulnerabilities":[{"cve":{"id":"CVE-2026-34730","sourceIdentifier":"security-advisories@github.com","published":"2026-04-02T19:21:32.560","lastModified":"2026-04-03T19:43:42.730","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local files that are accessible to the user running Copier and expose their contents in rendered output. This issue has been patched in version 9.14.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:copier-org:copier:*:*:*:*:*:python:*:*","versionEndExcluding":"9.14.1","matchCriteriaId":"08914294-5C57-49CB-8D05-BBB156C6B8B1"}]}]}],"references":[{"url":"https://github.com/copier-org/copier/commit/5413062eb17b73dc885f5e645cdc161e69ef641b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/copier-org/copier/releases/tag/v9.14.1","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/copier-org/copier/security/advisories/GHSA-hgjq-p8cr-gg4h","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/copier-org/copier/security/advisories/GHSA-hgjq-p8cr-gg4h","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}