Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
History

Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Description Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py. Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).

Tue, 17 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
References

Mon, 09 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 07 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
References

Sat, 07 Jun 2025 14:00:00 +0000

Type Values Removed Values Added
Description Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py.
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-06-07T00:00:00.000Z

Updated: 2025-06-17T21:01:16.030Z

Reserved: 2025-06-07T00:00:00.000Z

Link: CVE-2025-49619

cve-icon Vulnrichment

Updated: 2025-06-09T15:13:18.642Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-07T14:15:21.573

Modified: 2025-06-17T21:15:40.087

Link: CVE-2025-49619

cve-icon Redhat

No data.