CVE-2025-69516
HIGHAmidaware Tactical RMM <=1.3.1 - SSTI
Title source: llmDescription
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible.
Exploits (3)
nomisec
WORKING POC
4 stars
by NtGabrielGomes · poc
https://github.com/NtGabrielGomes/CVE-2025-69516
metasploit
WORKING POC
EXCELLENT
by Gabriel Gomes · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/tacticalrmm_ssti_rce_cve_2025_69516.rb
Scores
CVSS v3
8.8
EPSS
0.5316
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-1336
Status
published
Products (1)
amidaware/tactical_rmm
< 1.4.0
Published
Jan 29, 2026
Tracked Since
Feb 18, 2026