CVE-2014-0013
Description
Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application that contains templates whose context is set to a user-supplied primitive value and also contain the {{this}} special Handlebars variable.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ember.js before certain patches allows XSS via templates using `{{this}}` with a user-supplied primitive value as context.
Vulnerability
Ember.js versions 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 contain a cross-site scripting (XSS) vulnerability. The flaw arises when an application defines a template whose context is set to a user-supplied primitive value and the template also uses the {{this}} special Handlebars variable [1][2][3].
Exploitation
An attacker can trigger the vulnerability by supplying a malicious primitive value (e.g., a string) as the template context. When the template renders and references {{this}}, Handlebars may not properly escape the primitive value, allowing injection of arbitrary HTML or JavaScript. The attacker must find or create an endpoint in the application that renders a template with user-controlled context as a primitive [1][3].
Impact
Successful exploitation leads to cross-site scripting (XSS), enabling the attacker to execute arbitrary JavaScript in the context of the victim’s session. This can result in data theft, session hijacking, or other client-side attacks. The attacker does not need authentication if the vulnerable template is publicly accessible [1][3].
Mitigation
Users should upgrade to a fixed version: 1.0.1, 1.1.3, 1.2.1, 1.3.1, or 1.4.0-beta.2 and later. The fix was released on January 14, 2014, as noted in the Ember.js security announcement [3]. If upgrading immediately is not possible, applications should ensure that template contexts are never set to unsanitized user-supplied primitive values. No workaround other than patching is documented in the references.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ember-sourceRubyGems | >= 1.0.0.pre4.0, < 1.0.1 | 1.0.1 |
ember-sourceRubyGems | >= 1.1.0, < 1.1.3 | 1.1.3 |
ember-sourceRubyGems | >= 1.2.0.beta.1, < 1.2.1 | 1.2.1 |
ember-sourceRubyGems | >= 1.3.0.beta.1, < 1.3.1 | 1.3.1 |
ember-sourceRubyGems | >= 1.4.0-beta.1, < 1.4.0-beta.2 | 1.4.0-beta.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-8xm3-gm7c-5fjxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-0013ghsaADVISORY
- emberjs.com/blog/2014/01/14/ember-security-releases.htmlghsax_refsource_CONFIRMWEB
- groups.google.com/forum/ghsaWEB
- groups.google.com/forum/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.