Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14700: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in Arcadia Technology, LLC Crafty Controller

0
Critical
VulnerabilityCVE-2025-14700cvecve-2025-14700cwe-1336
Published: Wed Dec 17 2025 (12/17/2025, 00:04:37 UTC)
Source: CVE Database V5
Vendor/Project: Arcadia Technology, LLC
Product: Crafty Controller

Description

An input neutralization vulnerability in the Webhook Template component of Crafty Controller allows a remote, authenticated attacker to perform remote code execution via Server Side Template Injection.

AI-Powered Analysis

AILast updated: 12/24/2025, 01:33:09 UTC

Technical Analysis

CVE-2025-14700 is a critical vulnerability identified in the Webhook Template component of Arcadia Technology, LLC's Crafty Controller product, specifically version 4.6.1. The flaw is classified under CWE-1336, which involves improper neutralization of special elements used in a template engine. This vulnerability enables a remote, authenticated attacker to perform server-side template injection (SSTI), leading to remote code execution (RCE) on the affected system. The root cause lies in insufficient sanitization or neutralization of user-supplied input within the webhook template processing logic, allowing malicious template expressions to be evaluated by the server. Exploitation requires the attacker to have valid authentication credentials but does not require any further user interaction, making it easier to exploit once credentials are obtained. The CVSS v3.1 base score is 9.9, reflecting the vulnerability's critical impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vulnerability affects Crafty Controller 4.6.1, a product used for automation and orchestration tasks, which often have privileged access to infrastructure components. No patches or public exploits are currently available, but the vulnerability's nature suggests that successful exploitation could allow attackers to execute arbitrary code, escalate privileges, and move laterally within networks. The vulnerability was published on December 17, 2025, with no known exploits in the wild at this time.

Potential Impact

For European organizations, the impact of CVE-2025-14700 could be severe. Crafty Controller is typically deployed in environments requiring automation and orchestration, such as industrial control systems, IT infrastructure management, and cloud environments. Successful exploitation could lead to full system compromise, data theft, disruption of critical services, and potential sabotage of automated processes. This could affect confidentiality by exposing sensitive data, integrity by allowing unauthorized changes to configurations or code, and availability by causing system outages or denial of service. Given the critical CVSS score and the ability to execute code remotely, attackers could leverage this vulnerability to establish persistent footholds, move laterally, and escalate privileges within corporate networks. The lack of public exploits currently provides a window for mitigation, but the presence of authentication requirements means insider threats or compromised credentials could facilitate attacks. European organizations in sectors such as manufacturing, energy, finance, and government, which rely heavily on automation tools, are particularly at risk.

Mitigation Recommendations

1. Apply security patches from Arcadia Technology as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Crafty Controller Webhook Template component to trusted administrators only, using network segmentation and strict access controls. 3. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise that could enable exploitation. 4. Monitor logs and webhook template usage for unusual or unauthorized template expressions indicative of attempted exploitation. 5. Conduct regular audits of user accounts and permissions within Crafty Controller to minimize the attack surface. 6. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with rules tailored to detect SSTI patterns. 7. Educate administrators about the risks of template injection vulnerabilities and best practices for secure template usage. 8. Consider temporary disabling or limiting the webhook template functionality if feasible until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-12-14T14:48:04.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941f9b7d2cd6f6c37c0072f

Added to database: 12/17/2025, 12:30:47 AM

Last enriched: 12/24/2025, 1:33:09 AM

Last updated: 2/7/2026, 2:56:12 AM

Views: 211

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats