CVE-2025-69517: n/a
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier's position is that this has incorrect information.
AI Analysis
Technical Summary
CVE-2025-69517 is a remote code execution (RCE) vulnerability identified in Amidaware Inc's Tactical RMM software, specifically affecting version 1.3.1 and earlier. The vulnerability resides in the /api/tacticalrmm/apiv3/views.py component, which is part of the API handling mechanism of the software. Tactical RMM is a remote monitoring and management tool used by IT administrators to manage endpoints and infrastructure remotely. The flaw allows a remote attacker to send crafted requests to the vulnerable API endpoint, resulting in arbitrary code execution on the server hosting Tactical RMM. This can lead to full system compromise, enabling attackers to execute malicious payloads, escalate privileges, move laterally within networks, or disrupt services. The vulnerability does not require authentication or user interaction, increasing its risk profile. As of the current information, no CVSS score has been assigned, and no public exploits have been reported. However, the potential impact is significant due to the critical role of RMM tools in enterprise environments and their elevated privileges. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation and monitoring by affected organizations.
Potential Impact
For European organizations, this vulnerability could have severe consequences. Tactical RMM is commonly used by managed service providers (MSPs) and internal IT teams to maintain and secure IT infrastructure. Exploitation could lead to unauthorized access to sensitive data, disruption of IT operations, and potential deployment of ransomware or other malware. The ability to execute arbitrary code remotely without authentication means attackers can compromise systems at scale, potentially affecting multiple clients or departments. This risk is heightened in sectors with critical infrastructure, such as finance, healthcare, energy, and government, where Tactical RMM might be deployed. The compromise of such systems could lead to data breaches, operational downtime, regulatory non-compliance, and reputational damage. Additionally, the interconnected nature of European IT environments means that a successful attack could propagate across borders, affecting multinational organizations and supply chains.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict network access to the Tactical RMM API endpoint (/api/tacticalrmm/apiv3/views.py) using firewalls or network segmentation to limit exposure to trusted IP addresses only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API requests targeting this endpoint. 3) Monitor logs and network traffic for unusual activity or indicators of compromise related to Tactical RMM API usage. 4) Conduct an immediate inventory of Tactical RMM deployments to identify and isolate vulnerable instances. 5) Apply the principle of least privilege to the Tactical RMM service accounts and underlying systems to minimize potential damage from exploitation. 6) Prepare for rapid deployment of patches once available by establishing a vulnerability management process specific to Tactical RMM. 7) Educate IT staff and MSP partners about the vulnerability and encourage vigilance for signs of compromise. These targeted actions go beyond generic advice by focusing on the specific attack vector and operational context of Tactical RMM.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-69517: n/a
Description
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier's position is that this has incorrect information.
AI-Powered Analysis
Technical Analysis
CVE-2025-69517 is a remote code execution (RCE) vulnerability identified in Amidaware Inc's Tactical RMM software, specifically affecting version 1.3.1 and earlier. The vulnerability resides in the /api/tacticalrmm/apiv3/views.py component, which is part of the API handling mechanism of the software. Tactical RMM is a remote monitoring and management tool used by IT administrators to manage endpoints and infrastructure remotely. The flaw allows a remote attacker to send crafted requests to the vulnerable API endpoint, resulting in arbitrary code execution on the server hosting Tactical RMM. This can lead to full system compromise, enabling attackers to execute malicious payloads, escalate privileges, move laterally within networks, or disrupt services. The vulnerability does not require authentication or user interaction, increasing its risk profile. As of the current information, no CVSS score has been assigned, and no public exploits have been reported. However, the potential impact is significant due to the critical role of RMM tools in enterprise environments and their elevated privileges. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation and monitoring by affected organizations.
Potential Impact
For European organizations, this vulnerability could have severe consequences. Tactical RMM is commonly used by managed service providers (MSPs) and internal IT teams to maintain and secure IT infrastructure. Exploitation could lead to unauthorized access to sensitive data, disruption of IT operations, and potential deployment of ransomware or other malware. The ability to execute arbitrary code remotely without authentication means attackers can compromise systems at scale, potentially affecting multiple clients or departments. This risk is heightened in sectors with critical infrastructure, such as finance, healthcare, energy, and government, where Tactical RMM might be deployed. The compromise of such systems could lead to data breaches, operational downtime, regulatory non-compliance, and reputational damage. Additionally, the interconnected nature of European IT environments means that a successful attack could propagate across borders, affecting multinational organizations and supply chains.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict network access to the Tactical RMM API endpoint (/api/tacticalrmm/apiv3/views.py) using firewalls or network segmentation to limit exposure to trusted IP addresses only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API requests targeting this endpoint. 3) Monitor logs and network traffic for unusual activity or indicators of compromise related to Tactical RMM API usage. 4) Conduct an immediate inventory of Tactical RMM deployments to identify and isolate vulnerable instances. 5) Apply the principle of least privilege to the Tactical RMM service accounts and underlying systems to minimize potential damage from exploitation. 6) Prepare for rapid deployment of patches once available by establishing a vulnerability management process specific to Tactical RMM. 7) Educate IT staff and MSP partners about the vulnerability and encourage vigilance for signs of compromise. These targeted actions go beyond generic advice by focusing on the specific attack vector and operational context of Tactical RMM.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a30624623b1157cd4fb18
Added to database: 1/28/2026, 3:50:58 PM
Last enriched: 1/28/2026, 4:05:21 PM
Last updated: 2/5/2026, 4:28:54 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
UnknownCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.