{"id":"CVE-2026-33937","summary":"Handlebars.js has JavaScript Injection via AST Type Confusion","details":"Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a  `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable.","aliases":["GHSA-2w6w-674q-4c4q"],"modified":"2026-04-10T05:43:19.969369Z","published":"2026-03-27T21:03:46.748Z","related":["CGA-cfx6-h9x2-ppm6"],"database_specific":{"cwe_ids":["CWE-843","CWE-94"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33937.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33937.json"},{"type":"FIX","url":"https://github.com/handlebars-lang/handlebars.js/commit/68d8df5a88e0a26fe9e6084c5c6aaebe67b07da2"},{"type":"WEB","url":"https://github.com/handlebars-lang/handlebars.js/releases/tag/v4.7.9"},{"type":"ADVISORY","url":"https://github.com/handlebars-lang/handlebars.js/security/advisories/GHSA-2w6w-674q-4c4q"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33937"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/handlebars-lang/handlebars.js","events":[{"introduced":"bff5fab8f9d42e21950be00dcf1cedf4dc1a565b"},{"fixed":"dce542c9a660048d31f0981ac8a45c08b919bddb"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"4.7.9"}]}}],"versions":["v4.0.0","v4.0.1","v4.0.10","v4.0.11","v4.0.12","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.0.9","v4.1.1","v4.1.2","v4.1.2-0","v4.2.0","v4.2.1","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.4","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.5.0","v4.5.1","v4.5.2","v4.5.3","v4.6.0","v4.7.0","v4.7.1","v4.7.2","v4.7.3","v4.7.4","v4.7.5","v4.7.6","v4.7.7","v4.7.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33937.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}