GHSA-jv7x-xhv2-p5v2

Suggest an improvement
Source
https://github.com/advisories/GHSA-jv7x-xhv2-p5v2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-jv7x-xhv2-p5v2/GHSA-jv7x-xhv2-p5v2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-jv7x-xhv2-p5v2
Aliases
Published
2025-07-14T21:22:01Z
Modified
2025-07-28T17:18:31.631575Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
LaRecipe is vulnerable to Server-Side Template Injection attacks
Details

Impact

Attackers could: 1. Execute arbitrary commands on the server 2. Access sensitive environment variables 3. Escalate access depending on server configuration

A critical vulnerability was discovered in LaRecipe that allows an attacker to perform Server-Side Template Injection (SSTI), potentially leading to Remote Code Execution (RCE) in vulnerable configurations.

Patches

Users are strongly advised to upgrade to version v2.8.1 or later.

Credit

We would like to thank Roman Ananev for responsibly identifying and reporting this vulnerability.

Database specific
{
    "github_reviewed": true,
    "severity": "CRITICAL",
    "github_reviewed_at": "2025-07-14T21:22:01Z",
    "cwe_ids": [
        "CWE-1336"
    ],
    "nvd_published_at": "2025-07-14T23:15:24Z"
}
References

Affected packages

Packagist / binarytorch/larecipe

Package

Name
binarytorch/larecipe
Purl
pkg:composer/binarytorch/larecipe

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.1

Affected versions

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.3.6
v1.4.0

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.2.0
v2.2.1
v2.2.2
v2.2.3
v2.3.0
v2.4.0
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.5.0
v2.6.0
v2.6.1
v2.7.0
v2.8.0