VYPR
Moderate severityNVD Advisory· Published Feb 15, 2018· Updated Aug 6, 2024

CVE-2014-0013

CVE-2014-0013

Description

Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application that contains templates whose context is set to a user-supplied primitive value and also contain the {{this}} special Handlebars variable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ember.js before certain patches allows XSS via templates using `{{this}}` with a user-supplied primitive value as context.

Vulnerability

Ember.js versions 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 contain a cross-site scripting (XSS) vulnerability. The flaw arises when an application defines a template whose context is set to a user-supplied primitive value and the template also uses the {{this}} special Handlebars variable [1][2][3].

Exploitation

An attacker can trigger the vulnerability by supplying a malicious primitive value (e.g., a string) as the template context. When the template renders and references {{this}}, Handlebars may not properly escape the primitive value, allowing injection of arbitrary HTML or JavaScript. The attacker must find or create an endpoint in the application that renders a template with user-controlled context as a primitive [1][3].

Impact

Successful exploitation leads to cross-site scripting (XSS), enabling the attacker to execute arbitrary JavaScript in the context of the victim’s session. This can result in data theft, session hijacking, or other client-side attacks. The attacker does not need authentication if the vulnerable template is publicly accessible [1][3].

Mitigation

Users should upgrade to a fixed version: 1.0.1, 1.1.3, 1.2.1, 1.3.1, or 1.4.0-beta.2 and later. The fix was released on January 14, 2014, as noted in the Ember.js security announcement [3]. If upgrading immediately is not possible, applications should ensure that template contexts are never set to unsanitized user-supplied primitive values. No workaround other than patching is documented in the references.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ember-sourceRubyGems
>= 1.0.0.pre4.0, < 1.0.11.0.1
ember-sourceRubyGems
>= 1.1.0, < 1.1.31.1.3
ember-sourceRubyGems
>= 1.2.0.beta.1, < 1.2.11.2.1
ember-sourceRubyGems
>= 1.3.0.beta.1, < 1.3.11.3.1
ember-sourceRubyGems
>= 1.4.0-beta.1, < 1.4.0-beta.21.4.0-beta.2

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.