Skip to main content

CVE-2025-5309: CWE-94 Improper Control of Generation of Code ('Code Injection') in BeyondTrust Remote support & Privileged Remote Access

High
VulnerabilityCVE-2025-5309cvecve-2025-5309cwe-94
Published: Mon Jun 16 2025 (06/16/2025, 16:06:14 UTC)
Source: CVE Database V5
Vendor/Project: BeyondTrust
Product: Remote support & Privileged Remote Access

Description

The chat feature within Remote Support (RS) and Privileged Remote Access (PRA) is vulnerable to a Server-Side Template Injection vulnerability which can lead to remote code execution.

AI-Powered Analysis

AILast updated: 06/16/2025, 16:34:52 UTC

Technical Analysis

CVE-2025-5309 is a high-severity vulnerability affecting BeyondTrust's Remote Support (RS) and Privileged Remote Access (PRA) products, specifically versions 24.2.2, 24.3.1, and 25.1.1. The vulnerability is classified as CWE-94, indicating improper control of code generation, commonly known as a code injection flaw. The root cause lies in the chat feature of these products, which is susceptible to Server-Side Template Injection (SSTI). SSTI vulnerabilities occur when user-supplied input is embedded unsafely into server-side templates, allowing attackers to inject and execute arbitrary code on the server. In this case, exploitation can lead to remote code execution (RCE) without requiring any prior authentication (as indicated by the CVSS vector: PR:N), though user interaction is necessary (UI:A), such as sending crafted input via the chat interface. The vulnerability has a CVSS v4.0 base score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, with high exploitability due to network attack vector and low attack complexity. No known exploits are currently reported in the wild, but the potential for impactful attacks is significant given the privileged nature of these products, which are used to manage and support remote systems with elevated access rights. The absence of patches at the time of publication further increases risk for affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-5309 could be severe. BeyondTrust RS and PRA are widely used for secure remote administration and privileged access management, often deployed in critical infrastructure, financial institutions, healthcare, and government sectors. Successful exploitation could allow attackers to execute arbitrary code on the server hosting the BeyondTrust solution, potentially leading to full system compromise, unauthorized access to sensitive data, lateral movement within networks, and disruption of remote support operations. This could result in data breaches, operational downtime, and loss of trust. Given the high privileges typically associated with these products, the integrity and confidentiality of enterprise environments are at significant risk. The requirement for user interaction (sending malicious chat input) slightly reduces the attack surface but does not eliminate it, especially in environments where remote support personnel or users interact frequently with the chat feature. The lack of authentication requirement for exploitation further exacerbates the threat, as attackers can attempt exploitation from external networks without credentials.

Mitigation Recommendations

Organizations should immediately review their deployment of BeyondTrust Remote Support and Privileged Remote Access products to identify affected versions (24.2.2, 24.3.1, 25.1.1). Until patches are available, the following specific mitigations are recommended: 1) Disable or restrict the chat feature within these products to trusted users only or disable it entirely if not essential, minimizing the attack surface. 2) Implement strict network segmentation and firewall rules to limit access to the BeyondTrust management interfaces, allowing only trusted IP addresses and VPN connections. 3) Monitor chat logs and server logs for unusual or suspicious input patterns that could indicate exploitation attempts. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical SSTI payloads targeting the chat feature. 5) Enforce multi-factor authentication and least privilege principles for all users interacting with the BeyondTrust platform to reduce potential insider threats. 6) Prepare for rapid deployment of official patches once released by BeyondTrust and test updates in controlled environments before production rollout. 7) Conduct user awareness training for remote support staff to recognize and avoid engaging with suspicious chat inputs. These targeted actions go beyond generic advice by focusing on the vulnerable chat feature and the operational context of BeyondTrust products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
BT
Date Reserved
2025-05-28T17:50:50.656Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6850440da8c921274384591d

Added to database: 6/16/2025, 4:19:25 PM

Last enriched: 6/16/2025, 4:34:52 PM

Last updated: 8/9/2025, 11:23:12 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats