{"id":"OESA-2025-1531","summary":"python-jinja2 security update","details":"Jinja2 is one of the most used template engines for Python. It is inspired by Django&amp;apos;s templating system but extends it with an expressive language that gives template authors a more powerful set of tools. On top of that it adds sandboxed execution and optional automatic escaping for applications where security is important.\r\n\r\nSecurity Fix(es):\n\nJinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja&apos;s sandbox does catch calls to str.format and ensures they don&apos;t escape the sandbox. However, it&apos;s possible to use the |attr filter to get a reference to a string&apos;s plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment&apos;s attribute lookup. This vulnerability is fixed in 3.1.6.(CVE-2025-27516)","modified":"2026-03-11T07:08:23.410462Z","published":"2025-05-16T13:25:19Z","upstream":["CVE-2025-27516"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1531"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27516"}],"affected":[{"package":{"name":"python-jinja2","ecosystem":"openEuler:24.03-LTS","purl":"pkg:rpm/openEuler/python-jinja2&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.3-5.oe2403"}]}],"ecosystem_specific":{"src":["python-jinja2-3.1.3-5.oe2403.src.rpm"],"noarch":["python-jinja2-help-3.1.3-5.oe2403.noarch.rpm","python3-jinja2-3.1.3-5.oe2403.noarch.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2025-1531.json"}}],"schema_version":"1.7.5"}