CVE-2025-69516

HIGH

Amidaware Tactical RMM <=1.3.1 - SSTI

Title source: llm

Description

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible.

Exploits (3)

nomisec WORKING POC 4 stars
by NtGabrielGomes · poc
https://github.com/NtGabrielGomes/CVE-2025-69516
nomisec WORKING POC
by SNISS · poc
https://github.com/SNISS/CVE-2025-69516
metasploit WORKING POC EXCELLENT
by Gabriel Gomes · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/tacticalrmm_ssti_rce_cve_2025_69516.rb

Scores

CVSS v3 8.8
EPSS 0.5316
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-1336
Status published
Products (1)
amidaware/tactical_rmm < 1.4.0
Published Jan 29, 2026
Tracked Since Feb 18, 2026