Hubspot Hubspot

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Hubspot product.

RSS Feeds for Hubspot security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Hubspot products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Hubspot Sorted by Most Security Vulnerabilities since 2018

Hubspot2 vulnerabilities

Hubspot Jinjava2 vulnerabilities

By the Year

In 2026 there have been 1 vulnerability in Hubspot with an average score of 9.8 out of ten. Last year, in 2025 Hubspot had 1 security vulnerability published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Hubspot in 2026 could surpass last years number. Interestingly, the average vulnerability score and the number of vulnerabilities for 2026 and last year was the same.




Year Vulnerabilities Average Score
2026 1 9.80
2025 1 9.80
2024 1 5.40
2023 0 0.00
2022 1 8.80
2021 1 0.00
2020 0 0.00
2019 1 5.30

It may take a day or so for new Hubspot vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Hubspot Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-25526 Feb 04, 2026
JinJava <2.7.6/2.8.3: Unrestricted JVM Exec via ForTag Bypass JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
CVE-2025-59340 Sep 17, 2025
jinjava <2.8.1 Enables class deserialization via ObjectMapper – RCE risk jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1.
CVE-2024-5879 Aug 30, 2024
HubSpot WP Plugin v<=11.1.22: XSS via Meeting Widget 'url' The HubSpot CRM, Email Marketing, Live Chat, Forms & Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute of the HubSpot Meeting Widget in all versions up to, and including, 11.1.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Hubspot
CVE-2022-1239 May 02, 2022
The HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which could The HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which could allow users with the edit_posts capability (by default contributor and above) to perform SSRF attacks
Hubspot
CVE-2020-12668 Feb 19, 2021
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
Jinjava
CVE-2018-18893 Jan 03, 2019
Jinjava before 2.4.6 does not block the getClass method Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
Jinjava
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.