Blind Server-Side Template Injection occurs when user-controlled input is inserted into the template engine’s evaluation context, rather than being treated as part of the template syntax. This can lead to unintended code execution or data leakage.
To mitigate this vulnerability, ensure that any user-controlled input is properly sanitized and validated before being injected into the template engine. Consider using a whitelist approach for allowed characters and tags, and avoid allowing arbitrary code execution.