Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h92g-3xc3-ww2r Skyvern has a Jinja runtime leak
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.34205}

epss

{'score': 0.40597}


Wed, 18 Jun 2025 06:15:00 +0900

Type Values Removed Values Added
Description Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py. Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).

Wed, 18 Jun 2025 04:00:00 +0900

Type Values Removed Values Added
References

Tue, 10 Jun 2025 01:15:00 +0900

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 08 Jun 2025 05:45:00 +0900

Type Values Removed Values Added
References

Sat, 07 Jun 2025 23:00:00 +0900

Type Values Removed Values Added
Description Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py.
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-17T21:01:16.030Z

Reserved: 2025-06-07T00:00:00.000Z

Link: CVE-2025-49619

cve-icon Vulnrichment

Updated: 2025-06-09T15:13:18.642Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-07T14:15:21.573

Modified: 2025-06-17T21:15:40.087

Link: CVE-2025-49619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses