Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69516: n/a

0
High
VulnerabilityCVE-2025-69516cvecve-2025-69516
Published: Thu Jan 29 2026 (01/29/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible.

AI-Powered Analysis

AILast updated: 01/29/2026, 20:12:14 UTC

Technical Analysis

CVE-2025-69516 is a critical Server-Side Template Injection vulnerability found in Amidaware Tactical RMM, specifically in the /reporting/templates/preview/ endpoint. The vulnerability affects all versions up to and including v1.3.1. It stems from the improper handling of the user-supplied template_md parameter, which is passed directly to the Jinja2 templating engine's env.from_string function via the generate_html() method. Because env.from_string processes templates without restrictions, an attacker with Report Viewer or Report Manager permissions—roles typically assigned to low-privileged users—can inject arbitrary Jinja2 template expressions. This injection can lead to remote code execution on the server hosting the Tactical RMM instance. The vulnerability is severe because it does not require high privileges or user interaction beyond having report access, and it allows attackers to execute commands with the server's privileges. No patches or official fixes are currently linked, and no public exploits have been reported. The lack of a CVSS score necessitates an independent severity assessment. The vulnerability's exploitation could compromise the confidentiality, integrity, and availability of the affected systems, potentially allowing attackers to pivot within networks managed by Tactical RMM.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Amidaware Tactical RMM for remote monitoring and management of IT infrastructure. Successful exploitation could lead to full server compromise, enabling attackers to execute arbitrary commands, access sensitive data, manipulate monitoring data, or disrupt IT operations. This could affect critical sectors such as finance, healthcare, manufacturing, and government agencies that depend on Tactical RMM for operational continuity. The ability for low-privileged users to escalate to remote code execution increases the threat surface, particularly in environments with many users assigned report access. Additionally, compromised RMM servers could serve as launchpads for lateral movement within corporate networks, amplifying the impact. The absence of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation, as proof-of-concept exploits could emerge rapidly.

Mitigation Recommendations

Organizations should immediately audit user permissions to ensure that only trusted personnel have Report Viewer or Report Manager roles. Implement strict access controls and monitor usage of the /reporting/templates/preview/ endpoint for anomalous activity. Since no official patches are currently available, consider applying temporary mitigations such as disabling the vulnerable reporting feature or restricting access to the endpoint via network controls or web application firewalls (WAFs) with custom rules to detect and block suspicious template injection patterns. Review and sanitize all user inputs related to template rendering, and if possible, upgrade to a newer version of Amidaware Tactical RMM once a patch is released. Employ runtime application self-protection (RASP) tools to detect and prevent exploitation attempts. Regularly monitor vendor advisories for updates and apply security best practices for Jinja2 template handling in custom integrations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697bbbbbac06320222b23da0

Added to database: 1/29/2026, 7:57:47 PM

Last enriched: 1/29/2026, 8:12:14 PM

Last updated: 2/6/2026, 2:21:58 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats