Direct Jinja2 Template Rendering
Using Jinja2.Template directly instead of Flask's render_template bypasses Flask's security features.
XSS vulnerability in Flask applications where templates are rendered directly with raw Jinja2 without Flask's autoescaping or safe context handling, allowing malicious scripts to execute when untrusted data is rendered in user browsers.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Using Jinja2.Template directly instead of Flask's render_template bypasses Flask's security features.
Sourcery automatically identifies cross-site scripting (xss) via direct jinja2 template rendering in flask and many other security issues in your codebase.