CVE-2025-49619

Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
Configurations

No configuration.

History

17 Jun 2025, 21:15

Type Values Removed Values Added
Summary (en) Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py. (en) Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).

17 Jun 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.exploit-db.com/exploits/52335 -

09 Jun 2025, 16:15

Type Values Removed Values Added
References
  • () https://cristibtz.blog/posts/CVE-2025-49619/ -
Summary
  • (es) Skyvern hasta la versión 0.1.85 tiene una fuga de tiempo de ejecución de Jinja en sdk/workflow/models/block.py.

07 Jun 2025, 21:15

Type Values Removed Values Added
References
  • () https://cristibtz.github.io/posts/CVE-2025-49619/ -

07 Jun 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-07 14:15

Updated : 2025-06-17 21:15


NVD link : CVE-2025-49619

Mitre link : CVE-2025-49619

CVE.ORG link : CVE-2025-49619


JSON object : View

Products Affected

No product.

CWE