Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/knadh/listmonk
  4. ›
  5. GHSA-jc7g-x28f-3v3h

GHSA-jc7g-x28f-3v3h: listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user

June 9, 2025

The env and expandenv template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the {{ env }} template expression to capture sensitive environment variables.

Upgrade to v5.0.2 to mitigate.


References

  • github.com/advisories/GHSA-jc7g-x28f-3v3h
  • github.com/knadh/listmonk
  • github.com/knadh/listmonk/commit/d27d2c32cf3af2d0b24e29ea5a686ba149b49b3e
  • github.com/knadh/listmonk/releases/tag/v5.0.2
  • github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h

Code Behaviors & Features

Detect and mitigate GHSA-jc7g-x28f-3v3h with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0 before 5.0.2

Fixed versions

  • 5.0.2

Solution

Upgrade to version 5.0.2 or above.

Impact 9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Source file

go/github.com/knadh/listmonk/GHSA-jc7g-x28f-3v3h.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:52 +0000.