Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the the expression execution mechanisms. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions. If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library's protections to achieve Server-Side Template Injection (SSTI). This issue has ben fixed in version 3.1.4.RELEASE.
References
| Link | Resource |
|---|---|
| https://github.com/thymeleaf/thymeleaf/security/advisories/GHSA-xjw8-8c5c-9r79 | Vendor Advisory |
Configurations
History
24 Apr 2026, 16:58
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Thymeleaf thymeleaf
Thymeleaf |
|
| References | () https://github.com/thymeleaf/thymeleaf/security/advisories/GHSA-xjw8-8c5c-9r79 - Vendor Advisory | |
| CPE | cpe:2.3:a:thymeleaf:thymeleaf:*:*:*:*:*:*:*:* |
17 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-17 22:16
Updated : 2026-04-24 16:58
NVD link : CVE-2026-40478
Mitre link : CVE-2026-40478
CVE.ORG link : CVE-2026-40478
JSON object : View
Products Affected
thymeleaf
- thymeleaf
