Hubspot
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Hubspot product.
RSS Feeds for Hubspot security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Hubspot products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Hubspot Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 1 vulnerability in Hubspot with an average score of 9.8 out of ten. Last year, in 2025 Hubspot had 1 security vulnerability published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Hubspot in 2026 could surpass last years number. Interestingly, the average vulnerability score and the number of vulnerabilities for 2026 and last year was the same.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 9.80 |
| 2025 | 1 | 9.80 |
| 2024 | 1 | 5.40 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 8.80 |
| 2021 | 1 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 5.30 |
It may take a day or so for new Hubspot vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Hubspot Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-25526 | Feb 04, 2026 |
JinJava <2.7.6/2.8.3: Unrestricted JVM Exec via ForTag BypassJinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3. |
|
| CVE-2025-59340 | Sep 17, 2025 |
jinjava <2.8.1 Enables class deserialization via ObjectMapper – RCE riskjinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1. |
|
| CVE-2024-5879 | Aug 30, 2024 |
HubSpot WP Plugin v<=11.1.22: XSS via Meeting Widget 'url'The HubSpot CRM, Email Marketing, Live Chat, Forms & Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute of the HubSpot Meeting Widget in all versions up to, and including, 11.1.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
|
| CVE-2022-1239 | May 02, 2022 |
The HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which couldThe HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which could allow users with the edit_posts capability (by default contributor and above) to perform SSRF attacks |
|
| CVE-2020-12668 | Feb 19, 2021 |
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava contextJinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure. |
|
| CVE-2018-18893 | Jan 03, 2019 |
Jinjava before 2.4.6 does not block the getClass methodJinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java. |
|