CVE-2025-49619

HIGH EXPLOITED

Skyvern SSTI Remote Code Execution

Title source: metasploit

Description

Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).

Exploits (4)

exploitdb WORKING POC
by Cristian Branet · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52335
nomisec WORKING POC 2 stars
by cristibtz · remote-auth
https://github.com/cristibtz/CVE-2025-49619
github WRITEUP 1 stars
by cristibtz · javapoc
https://github.com/cristibtz/Security-Research/tree/main/CVE-2025-49619
metasploit WORKING POC EXCELLENT
by Cristian Branet, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/skyvern_ssti_cve_2025_49619.rb

Scores

CVSS v3 8.5
EPSS 0.7354
EPSS Percentile 98.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Details

VulnCheck KEV 2025-12-27
CWE
CWE-1336
Status published
Products (2)
pypi/skyvern 0PyPI
Skyvern/Skyvern < 0.1.85
Published Jun 07, 2025
Tracked Since Feb 18, 2026