CVE-2025-69516
📋 TL;DR
A Server-Side Template Injection vulnerability in Amidaware Tactical RMM allows low-privileged users with Report Viewer or Report Manager permissions to execute arbitrary commands on the server. This affects versions v1.3.1 and earlier due to improper sanitization of the template_md parameter in the /reporting/templates/preview/ endpoint.
💻 Affected Systems
- Amidaware Tactical RMM
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data theft, lateral movement, and persistent backdoor installation
Likely Case
Unauthorized command execution, data exfiltration, and privilege escalation
If Mitigated
Limited impact if proper network segmentation and least privilege are enforced
🎯 Exploit Status
Exploit requires authenticated access with Report Viewer or Report Manager permissions
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v1.3.2 or later
Vendor Advisory: https://github.com/amidaware/tacticalrmm
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Update to v1.3.2 or later from the official repository. 3. Restart the Tactical RMM service. 4. Verify the patch is applied.
🔧 Temporary Workarounds
Disable vulnerable endpoint
allTemporarily disable or restrict access to the /reporting/templates/preview/ endpoint
# Configure web server to block access to the endpoint
# Example for nginx: location /reporting/templates/preview/ { deny all; }
Restrict user permissions
allRemove Report Viewer and Report Manager permissions from non-essential users
# Use Tactical RMM admin interface to modify user permissions
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the RMM server
- Enforce least privilege by removing Report Viewer/Manager permissions from all non-essential users
🔍 How to Verify
Check if Vulnerable:
Check Tactical RMM version via admin interface or by examining the deployment. Versions ≤1.3.1 are vulnerable.
Check Version:
Check Tactical RMM web interface or deployment configuration files for version number
Verify Fix Applied:
Confirm version is ≥1.3.2 and test the /reporting/templates/preview/ endpoint with known SSTI payloads (in a safe environment).
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to /reporting/templates/preview/ with Jinja2 template syntax
- Suspicious command execution patterns in system logs
Network Indicators:
- HTTP POST requests to the vulnerable endpoint containing template injection patterns
SIEM Query:
source="tacticalrmm" AND uri_path="/reporting/templates/preview/" AND (request_body CONTAINS "{{" OR request_body CONTAINS "}}")