CVE-2025-49619

high

Description

Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).

References

https://www.exploit-db.com/exploits/52335

https://github.com/Skyvern-AI/skyvern/commit/db856cd8433a204c8b45979c70a4da1e119d949d

https://cristibtz.github.io/posts/CVE-2025-49619/

https://cristibtz.blog/posts/CVE-2025-49619/

Details

Source: Mitre, NVD

Published: 2025-06-07

Updated: 2025-06-17

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:P/A:N

Severity: High

CVSS v3

Base Score: 8.5

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Severity: High

EPSS

EPSS: 0.00032