CVE-2025-49619

8.5 HIGH

📋 TL;DR

Skyvern versions through 0.1.85 have a server-side template injection vulnerability in workflow block prompt fields. Authenticated attackers can inject malicious Jinja2 templates that execute arbitrary code on the server, leading to full system compromise. This affects all Skyvern deployments running vulnerable versions.

💻 Affected Systems

Products:
  • Skyvern
Versions: 0.1.85 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to workflow blocks with prompt fields.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to complete system takeover, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Authenticated attackers gain shell access on the Skyvern server, allowing them to steal credentials, manipulate workflows, and access internal systems.

🟢

If Mitigated

With proper network segmentation and least privilege, impact limited to the Skyvern application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but payloads are simple Jinja2 template injections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit db856cd8433a204c8b45979c70a4da1e119d949d

Vendor Advisory: https://github.com/Skyvern-AI/skyvern/commit/db856cd8433a204c8b45979c70a4da1e119d949d

Restart Required: Yes

Instructions:

1. Update Skyvern to version after commit db856cd8433a204c8b45979c70a4da1e119d949d. 2. Restart the Skyvern service. 3. Verify prompt field inputs are properly sanitized.

🔧 Temporary Workarounds

Disable vulnerable workflow blocks

all

Temporarily disable Navigation v2 Block and other workflow blocks with prompt fields until patched.

Modify Skyvern configuration to disable vulnerable blocks

Input validation middleware

all

Implement additional input validation layer to block Jinja2 template syntax in prompt fields.

Add custom validation regex to block {{, }}, {% and %} patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Skyvern servers from critical systems
  • Apply strict least privilege access controls and monitor all authenticated user activity

🔍 How to Verify

Check if Vulnerable:

Check if Skyvern version is 0.1.85 or earlier and test prompt fields for Jinja2 template execution.

Check Version:

Check Skyvern version in application interface or deployment configuration

Verify Fix Applied:

Verify Skyvern version is after commit db856cd8433a204c8b45979c70a4da1e119d949d and test that Jinja2 templates no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Jinja2 template patterns in prompt field logs
  • Suspicious system commands in application logs
  • Multiple failed template execution attempts

Network Indicators:

  • Unexpected outbound connections from Skyvern server
  • Unusual data exfiltration patterns

SIEM Query:

source="skyvern" AND ("{{" OR "}}" OR "{%" OR "%}") AND event="prompt_submission"

🔗 References

📤 Share & Export