Skip to main content

Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI

Critical
Published: Sun Jun 15 2025 (06/15/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI

AI-Powered Analysis

AILast updated: 06/16/2025, 05:36:38 UTC

Technical Analysis

The Skyvern 0.1.85 vulnerability involves a critical Remote Code Execution (RCE) exploit via Server-Side Template Injection (SSTI). SSTI vulnerabilities occur when user input is unsafely embedded into server-side templates, allowing attackers to inject and execute arbitrary code on the server. In this case, Skyvern version 0.1.85 is susceptible to such an injection, enabling attackers to execute arbitrary commands remotely without authentication or user interaction. The exploit leverages the template engine's unsafe handling of input, allowing attackers to bypass typical security controls and gain full control over the affected system. The presence of exploit code written in Python indicates that proof-of-concept or weaponized scripts are available, facilitating exploitation by attackers with moderate technical skills. Although no CVSS score is assigned, the critical severity rating reflects the high risk posed by this vulnerability due to its ability to compromise confidentiality, integrity, and availability of affected systems. The lack of patch links suggests that no official fix has been released yet, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially those relying on Skyvern 0.1.85 in their web infrastructure. Successful exploitation can lead to full system compromise, data breaches, service disruption, and lateral movement within corporate networks. Confidential information, including personal data protected under GDPR, could be exposed or manipulated, resulting in regulatory penalties and reputational damage. Critical sectors such as finance, healthcare, and government agencies are particularly at risk due to their reliance on secure web applications and the sensitivity of their data. Additionally, the ability to execute arbitrary code remotely without authentication increases the attack surface and lowers the barrier for attackers, including cybercriminals and state-sponsored actors. The absence of known exploits in the wild currently provides a limited window for proactive defense, but the availability of exploit code suggests this may change rapidly.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, conduct a thorough inventory to identify all instances of Skyvern 0.1.85 in use. Employ strict input validation and sanitization on all user-supplied data that interacts with template engines to prevent injection. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SSTI payload patterns, especially those targeting Skyvern. Monitor network traffic and server logs for unusual template-related errors or suspicious command execution attempts. Isolate vulnerable systems within segmented network zones to limit potential lateral movement. Consider temporary disabling or restricting access to affected services until a patch is available. Engage with vendors or the open-source community for updates or unofficial patches. Finally, conduct security awareness training for developers to avoid unsafe template usage in future deployments.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52335
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI

# Exploit Title: Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI
# Date: 2025-06-15
# Exploit Author: Cristian Branet
# Vendor Homepage: https://www.skyvern.com/
# Software Link: https://github.com/Skyvern-AI/skyvern
# Version: < 0.1.85, before commit db856cd
# Tested on: Skyvern Cloud app / Local Skyvern (Linux Ubuntu 22.04)
# CVE : CVE-2025-49619
# Article: https://cristibtz.github.io/posts/CVE-2025-49619/

'''
Skyvern's Workflow Editor allows prompt injection via Jinja2 template syntax.
... (4071 more characters)
Code Length: 4,571 characters

Threat ID: 684fad5ba8c921274383b0e7

Added to database: 6/16/2025, 5:36:27 AM

Last enriched: 6/16/2025, 5:36:38 AM

Last updated: 8/18/2025, 11:32:11 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats