Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64087: n/a

0
Critical
VulnerabilityCVE-2025-64087cvecve-2025-64087
Published: Tue Jan 20 2026 (01/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component used by opensagres XDocReport versions 1. 0. 0 to 2. 1. 0. This flaw allows unauthenticated remote attackers to execute arbitrary code on affected systems by injecting malicious template expressions. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the ease of exploitation and severity make it a significant threat. European organizations using XDocReport for document generation or reporting are at risk, especially those in sectors with high reliance on automated document processing.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:15:01 UTC

Technical Analysis

CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability identified in the FreeMarker template engine component integrated within opensagres XDocReport versions 1.0.0 through 2.1.0. FreeMarker is a widely used Java-based template engine for generating text outputs, including documents and reports. The vulnerability arises because the application improperly handles user-supplied template expressions, allowing attackers to inject crafted templates that the server processes. This injection leads to arbitrary code execution on the server side, enabling attackers to execute commands, access sensitive data, or disrupt services. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, making it a critical risk. While no public exploits have been reported yet, the vulnerability's nature and severity suggest that exploitation could be straightforward once proof-of-concept code is developed. The affected component, opensagres XDocReport, is used in various enterprise environments for document generation, making this vulnerability particularly dangerous in automated reporting workflows. The lack of available patches at the time of disclosure underscores the urgency for organizations to implement interim mitigations such as input validation, template sandboxing, and restricting template editing privileges.

Potential Impact

For European organizations, the impact of CVE-2025-64087 is significant due to the potential for complete system compromise through arbitrary code execution. Organizations relying on opensagres XDocReport for automated document generation, reporting, or business process automation could face data breaches, service disruptions, and loss of data integrity. Confidential information processed or generated by these systems could be exposed or altered, leading to regulatory compliance violations under GDPR and other data protection laws. The availability of critical services might be impacted if attackers leverage this vulnerability to deploy ransomware or disrupt operations. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks, especially in sectors such as finance, healthcare, government, and manufacturing, where document automation is prevalent. Additionally, the lack of known exploits currently provides a window for proactive defense, but also means organizations must act quickly to prevent future exploitation. The reputational damage and financial losses resulting from successful attacks could be substantial.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from opensagres XDocReport as soon as they become available. 2. Until patches are released, restrict access to template editing interfaces to trusted administrators only. 3. Implement strict input validation and sanitization on all user-supplied template data to prevent injection of malicious expressions. 4. Employ sandboxing techniques for template processing to limit the execution scope and prevent arbitrary code execution. 5. Conduct code reviews and security assessments of any custom templates or integrations using FreeMarker to identify unsafe patterns. 6. Use network segmentation and firewall rules to limit exposure of systems running vulnerable versions. 7. Deploy runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting SSTI attack patterns. 8. Increase monitoring and logging around document generation services to detect anomalous template processing or execution behaviors. 9. Educate developers and administrators about the risks of SSTI vulnerabilities and secure template handling practices. 10. Prepare incident response plans specifically addressing potential exploitation scenarios involving template injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f9d594623b1157c3b500f

Added to database: 1/20/2026, 3:20:57 PM

Last enriched: 1/27/2026, 8:15:01 PM

Last updated: 2/5/2026, 11:50:41 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats