CVE-2025-64087: n/a
CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component used by opensagres XDocReport versions 1. 0. 0 to 2. 1. 0. This flaw allows unauthenticated remote attackers to execute arbitrary code on affected systems by injecting malicious template expressions. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the ease of exploitation and severity make it a significant threat. European organizations using XDocReport for document generation or reporting are at risk, especially those in sectors with high reliance on automated document processing.
AI Analysis
Technical Summary
CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability identified in the FreeMarker template engine component integrated within opensagres XDocReport versions 1.0.0 through 2.1.0. FreeMarker is a widely used Java-based template engine for generating text outputs, including documents and reports. The vulnerability arises because the application improperly handles user-supplied template expressions, allowing attackers to inject crafted templates that the server processes. This injection leads to arbitrary code execution on the server side, enabling attackers to execute commands, access sensitive data, or disrupt services. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, making it a critical risk. While no public exploits have been reported yet, the vulnerability's nature and severity suggest that exploitation could be straightforward once proof-of-concept code is developed. The affected component, opensagres XDocReport, is used in various enterprise environments for document generation, making this vulnerability particularly dangerous in automated reporting workflows. The lack of available patches at the time of disclosure underscores the urgency for organizations to implement interim mitigations such as input validation, template sandboxing, and restricting template editing privileges.
Potential Impact
For European organizations, the impact of CVE-2025-64087 is significant due to the potential for complete system compromise through arbitrary code execution. Organizations relying on opensagres XDocReport for automated document generation, reporting, or business process automation could face data breaches, service disruptions, and loss of data integrity. Confidential information processed or generated by these systems could be exposed or altered, leading to regulatory compliance violations under GDPR and other data protection laws. The availability of critical services might be impacted if attackers leverage this vulnerability to deploy ransomware or disrupt operations. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks, especially in sectors such as finance, healthcare, government, and manufacturing, where document automation is prevalent. Additionally, the lack of known exploits currently provides a window for proactive defense, but also means organizations must act quickly to prevent future exploitation. The reputational damage and financial losses resulting from successful attacks could be substantial.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from opensagres XDocReport as soon as they become available. 2. Until patches are released, restrict access to template editing interfaces to trusted administrators only. 3. Implement strict input validation and sanitization on all user-supplied template data to prevent injection of malicious expressions. 4. Employ sandboxing techniques for template processing to limit the execution scope and prevent arbitrary code execution. 5. Conduct code reviews and security assessments of any custom templates or integrations using FreeMarker to identify unsafe patterns. 6. Use network segmentation and firewall rules to limit exposure of systems running vulnerable versions. 7. Deploy runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting SSTI attack patterns. 8. Increase monitoring and logging around document generation services to detect anomalous template processing or execution behaviors. 9. Educate developers and administrators about the risks of SSTI vulnerabilities and secure template handling practices. 10. Prepare incident response plans specifically addressing potential exploitation scenarios involving template injection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-64087: n/a
Description
CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component used by opensagres XDocReport versions 1. 0. 0 to 2. 1. 0. This flaw allows unauthenticated remote attackers to execute arbitrary code on affected systems by injecting malicious template expressions. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently in the wild, the ease of exploitation and severity make it a significant threat. European organizations using XDocReport for document generation or reporting are at risk, especially those in sectors with high reliance on automated document processing.
AI-Powered Analysis
Technical Analysis
CVE-2025-64087 is a critical Server-Side Template Injection (SSTI) vulnerability identified in the FreeMarker template engine component integrated within opensagres XDocReport versions 1.0.0 through 2.1.0. FreeMarker is a widely used Java-based template engine for generating text outputs, including documents and reports. The vulnerability arises because the application improperly handles user-supplied template expressions, allowing attackers to inject crafted templates that the server processes. This injection leads to arbitrary code execution on the server side, enabling attackers to execute commands, access sensitive data, or disrupt services. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, making it a critical risk. While no public exploits have been reported yet, the vulnerability's nature and severity suggest that exploitation could be straightforward once proof-of-concept code is developed. The affected component, opensagres XDocReport, is used in various enterprise environments for document generation, making this vulnerability particularly dangerous in automated reporting workflows. The lack of available patches at the time of disclosure underscores the urgency for organizations to implement interim mitigations such as input validation, template sandboxing, and restricting template editing privileges.
Potential Impact
For European organizations, the impact of CVE-2025-64087 is significant due to the potential for complete system compromise through arbitrary code execution. Organizations relying on opensagres XDocReport for automated document generation, reporting, or business process automation could face data breaches, service disruptions, and loss of data integrity. Confidential information processed or generated by these systems could be exposed or altered, leading to regulatory compliance violations under GDPR and other data protection laws. The availability of critical services might be impacted if attackers leverage this vulnerability to deploy ransomware or disrupt operations. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks, especially in sectors such as finance, healthcare, government, and manufacturing, where document automation is prevalent. Additionally, the lack of known exploits currently provides a window for proactive defense, but also means organizations must act quickly to prevent future exploitation. The reputational damage and financial losses resulting from successful attacks could be substantial.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from opensagres XDocReport as soon as they become available. 2. Until patches are released, restrict access to template editing interfaces to trusted administrators only. 3. Implement strict input validation and sanitization on all user-supplied template data to prevent injection of malicious expressions. 4. Employ sandboxing techniques for template processing to limit the execution scope and prevent arbitrary code execution. 5. Conduct code reviews and security assessments of any custom templates or integrations using FreeMarker to identify unsafe patterns. 6. Use network segmentation and firewall rules to limit exposure of systems running vulnerable versions. 7. Deploy runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting SSTI attack patterns. 8. Increase monitoring and logging around document generation services to detect anomalous template processing or execution behaviors. 9. Educate developers and administrators about the risks of SSTI vulnerabilities and secure template handling practices. 10. Prepare incident response plans specifically addressing potential exploitation scenarios involving template injection.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 696f9d594623b1157c3b500f
Added to database: 1/20/2026, 3:20:57 PM
Last enriched: 1/27/2026, 8:15:01 PM
Last updated: 2/7/2026, 7:37:27 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.