Vulnerability Description
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.7, a circular block reference in {% layout %} / {% block %} causes an infinite recursive loop, consuming all available memory (~4GB) and crashing the Node.js process with FATAL ERROR: JavaScript heap out of memory. This allows any user who can submit a Liquid template to perform a Denial of Service attack. This issue has been patched in version 10.25.7.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Liquidjs | Liquidjs | < 10.25.7 |
Related Weaknesses (CWE)
References
- https://github.com/harttle/liquidjs/commit/e2311dfd6e82f73509308aa8a3a1fafc92e22Patch
- https://github.com/harttle/liquidjs/releases/tag/v10.25.7ProductRelease Notes
- https://github.com/harttle/liquidjs/security/advisories/GHSA-4rc3-7j7w-m548ExploitVendor Advisory
- https://github.com/harttle/liquidjs/security/advisories/GHSA-4rc3-7j7w-m548ExploitVendor Advisory
FAQ
What is CVE-2026-41311?
CVE-2026-41311 is a vulnerability with a CVSS score of 7.5 (HIGH). LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.7, a circular block reference in {% layout %} / {% block %} causes an infinite recursive loop...
How severe is CVE-2026-41311?
CVE-2026-41311 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41311?
Check the references section above for vendor advisories and patch information. Affected products include: Liquidjs Liquidjs.