CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-36361: Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient,...

Description

Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.

Classification

CVE ID: CVE-2024-36361

Affected Products

Vendor: n/a

Product: n/a

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.98% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://github.com/pugjs/pug/pull/3428
https://pugjs.org/api/reference.html

Timeline