CVE-2025-49619
HIGH EXPLOITEDSkyvern SSTI Remote Code Execution
Title source: metasploitDescription
Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
Exploits (4)
exploitdb
WORKING POC
by Cristian Branet · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52335
github
WRITEUP
1 stars
by cristibtz · javapoc
https://github.com/cristibtz/Security-Research/tree/main/CVE-2025-49619
metasploit
WORKING POC
EXCELLENT
by Cristian Branet, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/skyvern_ssti_cve_2025_49619.rb
References (4)
Scores
CVSS v3
8.5
EPSS
0.7354
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Details
VulnCheck KEV
2025-12-27
CWE
CWE-1336
Status
published
Products (2)
pypi/skyvern
0PyPI
Skyvern/Skyvern
< 0.1.85
Published
Jun 07, 2025
Tracked Since
Feb 18, 2026