Generated remediation guidance and an executive summary. No account required.
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `resolvePartial()` in the Handlebars runtime resolves partial names via a plain property lookup on `options.partials` without guarding against prototype-chain traversal. When `Object.prototype` has been polluted with a string value whose key matches a partial reference in a template, the polluted string is used as the partial body and rendered without HTML escaping, resulting in reflected or stored XSS. Version 4.7.9 fixes the issue. Some workarounds are available. Apply `Object.freeze(Object.prototype)` early in application startup to prevent prototype pollution. Note: this may break other libraries, and/or use the Handlebars runtime-only build (`handlebars/runtime`), which does not compile templates and reduces the attack surface.
Cite this page
CVE-2026-33916. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-33916
Use CWE-79, Handlebarsjs vendor hub and Handlebars product page to widen CVE-2026-33916 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33937, CVE-2026-33941 and CVE-2026-33940 for nearby disclosures in the same product family.