CVE-2025-69516: n/a
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible.
AI Analysis
Technical Summary
CVE-2025-69516 is a critical Server-Side Template Injection vulnerability found in Amidaware Tactical RMM, specifically in the /reporting/templates/preview/ endpoint. The vulnerability affects all versions up to and including v1.3.1. It stems from the improper handling of the user-supplied template_md parameter, which is passed directly to the Jinja2 templating engine's env.from_string function via the generate_html() method. Because env.from_string processes templates without restrictions, an attacker with Report Viewer or Report Manager permissions—roles typically assigned to low-privileged users—can inject arbitrary Jinja2 template expressions. This injection can lead to remote code execution on the server hosting the Tactical RMM instance. The vulnerability is severe because it does not require high privileges or user interaction beyond having report access, and it allows attackers to execute commands with the server's privileges. No patches or official fixes are currently linked, and no public exploits have been reported. The lack of a CVSS score necessitates an independent severity assessment. The vulnerability's exploitation could compromise the confidentiality, integrity, and availability of the affected systems, potentially allowing attackers to pivot within networks managed by Tactical RMM.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Amidaware Tactical RMM for remote monitoring and management of IT infrastructure. Successful exploitation could lead to full server compromise, enabling attackers to execute arbitrary commands, access sensitive data, manipulate monitoring data, or disrupt IT operations. This could affect critical sectors such as finance, healthcare, manufacturing, and government agencies that depend on Tactical RMM for operational continuity. The ability for low-privileged users to escalate to remote code execution increases the threat surface, particularly in environments with many users assigned report access. Additionally, compromised RMM servers could serve as launchpads for lateral movement within corporate networks, amplifying the impact. The absence of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation, as proof-of-concept exploits could emerge rapidly.
Mitigation Recommendations
Organizations should immediately audit user permissions to ensure that only trusted personnel have Report Viewer or Report Manager roles. Implement strict access controls and monitor usage of the /reporting/templates/preview/ endpoint for anomalous activity. Since no official patches are currently available, consider applying temporary mitigations such as disabling the vulnerable reporting feature or restricting access to the endpoint via network controls or web application firewalls (WAFs) with custom rules to detect and block suspicious template injection patterns. Review and sanitize all user inputs related to template rendering, and if possible, upgrade to a newer version of Amidaware Tactical RMM once a patch is released. Employ runtime application self-protection (RASP) tools to detect and prevent exploitation attempts. Regularly monitor vendor advisories for updates and apply security best practices for Jinja2 template handling in custom integrations.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-69516: n/a
Description
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-69516 is a critical Server-Side Template Injection vulnerability found in Amidaware Tactical RMM, specifically in the /reporting/templates/preview/ endpoint. The vulnerability affects all versions up to and including v1.3.1. It stems from the improper handling of the user-supplied template_md parameter, which is passed directly to the Jinja2 templating engine's env.from_string function via the generate_html() method. Because env.from_string processes templates without restrictions, an attacker with Report Viewer or Report Manager permissions—roles typically assigned to low-privileged users—can inject arbitrary Jinja2 template expressions. This injection can lead to remote code execution on the server hosting the Tactical RMM instance. The vulnerability is severe because it does not require high privileges or user interaction beyond having report access, and it allows attackers to execute commands with the server's privileges. No patches or official fixes are currently linked, and no public exploits have been reported. The lack of a CVSS score necessitates an independent severity assessment. The vulnerability's exploitation could compromise the confidentiality, integrity, and availability of the affected systems, potentially allowing attackers to pivot within networks managed by Tactical RMM.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Amidaware Tactical RMM for remote monitoring and management of IT infrastructure. Successful exploitation could lead to full server compromise, enabling attackers to execute arbitrary commands, access sensitive data, manipulate monitoring data, or disrupt IT operations. This could affect critical sectors such as finance, healthcare, manufacturing, and government agencies that depend on Tactical RMM for operational continuity. The ability for low-privileged users to escalate to remote code execution increases the threat surface, particularly in environments with many users assigned report access. Additionally, compromised RMM servers could serve as launchpads for lateral movement within corporate networks, amplifying the impact. The absence of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation, as proof-of-concept exploits could emerge rapidly.
Mitigation Recommendations
Organizations should immediately audit user permissions to ensure that only trusted personnel have Report Viewer or Report Manager roles. Implement strict access controls and monitor usage of the /reporting/templates/preview/ endpoint for anomalous activity. Since no official patches are currently available, consider applying temporary mitigations such as disabling the vulnerable reporting feature or restricting access to the endpoint via network controls or web application firewalls (WAFs) with custom rules to detect and block suspicious template injection patterns. Review and sanitize all user inputs related to template rendering, and if possible, upgrade to a newer version of Amidaware Tactical RMM once a patch is released. Employ runtime application self-protection (RASP) tools to detect and prevent exploitation attempts. Regularly monitor vendor advisories for updates and apply security best practices for Jinja2 template handling in custom integrations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697bbbbbac06320222b23da0
Added to database: 1/29/2026, 7:57:47 PM
Last enriched: 1/29/2026, 8:12:14 PM
Last updated: 2/6/2026, 2:21:58 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.