Remote code execution in ejs

Published: 2022-06-01
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-29078
Exploitation vector Network
Public exploit N/A
Vulnerable software
Web applications / JS libraries

Vendor EJS

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Code injection

EUVDB-ID: #VU63903

Risk: High


CVE-ID: CVE-2022-29078

CWE-ID: CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Exploit availability: No


The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper input validation when parsing data passed to "settings[view options][outputFunctionName]". A remote attacker can send specially crafted request to the application, perform server-side template injection and execute arbitrary code on the system.


Install updates from vendor's website.

Vulnerable software versions

EJS: 3.0.1 - 3.1.6

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?