CVE-2025-25362

9.8 CRITICAL

📋 TL;DR

This Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code by injecting malicious payloads into template fields. This affects any system running the vulnerable version of Spacy-LLM, particularly those exposing template functionality to untrusted users.

💻 Affected Systems

Products:
  • Spacy-LLM
Versions: v0.7.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where template functionality is exposed, particularly in LLM prompt processing pipelines.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized code execution leading to data theft, service disruption, or installation of backdoors.

🟢

If Mitigated

Limited impact with proper input validation and sandboxing, potentially only denial of service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSTI vulnerabilities are well-understood with established exploitation patterns; public references demonstrate proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.7.3 or later

Vendor Advisory: https://github.com/explosion/spacy-llm/issues/492

Restart Required: Yes

Instructions:

1. Update Spacy-LLM to v0.7.3 or later using pip: pip install --upgrade spacy-llm. 2. Restart any services using Spacy-LLM. 3. Verify the update with pip show spacy-llm.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation to reject suspicious template patterns before processing.

Template Sandboxing

all

Run template processing in isolated environments with restricted permissions.

🧯 If You Can't Patch

  • Disable or restrict access to template functionality in Spacy-LLM configurations.
  • Implement network segmentation and firewall rules to limit access to affected systems.

🔍 How to Verify

Check if Vulnerable:

Check if Spacy-LLM version is exactly 0.7.2 using pip show spacy-llm or by examining package metadata.

Check Version:

pip show spacy-llm | grep Version

Verify Fix Applied:

Confirm version is 0.7.3 or higher with pip show spacy-llm and test template functionality with safe inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual template patterns in application logs
  • Error messages related to template processing failures
  • Unexpected process executions from Spacy-LLM context

Network Indicators:

  • Suspicious outbound connections from Spacy-LLM hosts
  • Anomalous data exfiltration patterns

SIEM Query:

source="application_logs" AND "spacy-llm" AND ("template" OR "SSTI" OR "injection")

🔗 References

📤 Share & Export