
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-59340 is a critical vulnerability discovered in HubSpot's Jinjava template engine, a Java-based template engine based on django template syntax. The vulnerability was disclosed on September 17, 2025, affecting all versions prior to 2.8.1. This security flaw allows attackers to bypass Jinjava's sandbox restrictions through JavaType-based deserialization, potentially leading to remote code execution. The vulnerability carries a Critical CVSS score of 9.8, indicating its severe impact (NVD, GitHub Advisory).
The vulnerability stems from the exposure of a built-in variable int3rpr3t3r, which provides direct access to the jinjavaInterpreter instance. Through this variable, attackers can traverse to the config field and access an ObjectMapper. By using mapper.getTypeFactory().constructFromCanonical(), attackers can instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. Although Jinjava restricts dangerous classes like Class and ClassLoader, the JavaType class itself remains unrestricted, allowing attackers to bypass sandbox protections and instantiate semi-arbitrary classes without directly invoking restricted methods (GitHub Advisory).
The vulnerability enables attackers to escape the Jinjava sandbox and instantiate a wide range of classes using JavaType. This capability allows unauthorized access to local files (e.g., /etc/passwd), performing server-side request forgery (SSRF) attacks, and potentially achieving complete remote code execution depending on the target environment's available classes. The vulnerability particularly affects applications running Jinjava versions prior to 2.8.1 (Security Online).
HubSpot has released version 2.8.1 to address this vulnerability. The patch restricts property accessing to disallow fetching properties from restricted bases. Organizations using HubSpot's Jinjava template engine should immediately upgrade to version 2.8.1 or later. The fix specifically modifies the getValue method in JinjavaBeanELResolver to prevent property access on restricted classes (GitHub Commit, GitHub Release).
The vulnerability has raised significant concerns in the cybersecurity community due to its widespread impact on websites and applications using the HubSpot CMS. The critical severity rating and the potential for remote code execution have prompted urgent calls for patching across the industry (GBHackers).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."