UNKNOWNCVE-2026-33937

Handlebars.js has JavaScript Injection via AST Type Confusion

Platform

nodejs

Component

handlebars

Fixed in

4.7.9

Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable.

How to fix

Actualice la versión de Handlebars.js a la 4.7.9 o superior. Como alternativa, valide el tipo de entrada antes de llamar a `Handlebars.compile()` para asegurarse de que siempre sea una cadena y no un objeto. Si los templates se precompilan, use la versión runtime-only (`handlebars/runtime`) en el servidor.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free