Skip to content

fix(deps): update dependency org.thymeleaf:thymeleaf to v3.1.4.release [security]#10249

Open
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/maven-org.thymeleaf-thymeleaf-vulnerability
Open

fix(deps): update dependency org.thymeleaf:thymeleaf to v3.1.4.release [security]#10249
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/maven-org.thymeleaf-thymeleaf-vulnerability

Conversation

@renovate-bot
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
org.thymeleaf:thymeleaf (source) 3.1.2.RELEASE3.1.4.RELEASE age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2026-40477

Impact

A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.3.RELEASE. Although the library provides mechanisms to prevent expression injection, it fails to properly restrict the scope of accessible objects, allowing specific potentially sensitive objects to be reached from within a template. If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library's protections to achieve Server-Side Template Injection (SSTI).

Patches

This has been fixed in Thymeleaf 3.1.4.RELEASE.

Workarounds

No workaround is available beyond ensuring applications do not pass unvalidated user input directly to the template engine. Upgrading to 3.1.4.RELEASE is strongly recommended in any case.

Credits

Thanks to Thomas Reburn (Praetorian) for responsible disclosure.

Severity
  • CVSS Score: 9.1 / 10 (Critical)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2026-40478

Impact

A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.3.RELEASE. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions. If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library's protections to achieve Server-Side Template Injection (SSTI).

Patches

This has been fixed in Thymeleaf 3.1.4.RELEASE.

Workarounds

No workaround is available beyond ensuring applications do not pass unvalidated user input directly to the template engine. Upgrading to 3.1.4.RELEASE is strongly recommended in any case.

Credits

Thanks to Dawid Bakaj (VIPentest.com) for responsible disclosure.

Severity
  • CVSS Score: 9.1 / 10 (Critical)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@forking-renovate forking-renovate bot added lang: java Issues specific to Java. type:security labels Apr 16, 2026
@renovate-bot renovate-bot added the lang: java Issues specific to Java. label Apr 16, 2026
@renovate-bot renovate-bot requested review from a team and yoshi-approver as code owners April 16, 2026 04:47
@renovate-bot renovate-bot requested a review from a team as a code owner April 16, 2026 04:47
@trusted-contributions-gcf trusted-contributions-gcf bot added the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Apr 16, 2026
@product-auto-label product-auto-label bot added samples Issues that are directly related to samples. api: appengine Issues related to the App Engine Admin API API. labels Apr 16, 2026
@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Apr 16, 2026
Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the Thymeleaf dependency version in the pom.xml file. The review feedback correctly identifies that the version 3.1.4.RELEASE does not exist in Maven Central due to a change in Thymeleaf's versioning scheme and suggests using 3.1.4 instead.

<groupId>org.thymeleaf</groupId>
<artifactId>thymeleaf</artifactId>
<version>3.1.2.RELEASE</version>
<version>3.1.4.RELEASE</version>
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security-critical critical

The version 3.1.4.RELEASE does not exist in Maven Central. Starting with version 3.1.3, Thymeleaf has changed its versioning scheme and removed the .RELEASE suffix. The correct version to use is 3.1.4. Additionally, while this update addresses the SSTI vulnerabilities mentioned in the PR, please be aware that the application's templates (e.g., index.html) use th:utext to render user-controlled data such as headers and cookies, which introduces a significant Cross-Site Scripting (XSS) vulnerability. It is strongly recommended to switch to th:text for automatic HTML escaping.

Suggested change
<version>3.1.4.RELEASE</version>
<version>3.1.4</version>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

api: appengine Issues related to the App Engine Admin API API. lang: java Issues specific to Java. samples Issues that are directly related to samples. type:security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants