CVE-2025-70830
📋 TL;DR
This CVE describes a Server-Side Template Injection vulnerability in Datart's Freemarker template engine that allows authenticated attackers to execute arbitrary code by injecting malicious template syntax into SQL script fields. Attackers can achieve remote code execution on affected systems. All users running vulnerable versions of Datart are affected.
💻 Affected Systems
- Datart
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and persistent backdoor installation.
Likely Case
Data breach, privilege escalation, and installation of cryptocurrency miners or ransomware on vulnerable systems.
If Mitigated
Limited impact with proper network segmentation, strong authentication, and input validation preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authentication is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Monitor the official Datart repository for updates and apply when released.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and sanitization for SQL script fields to reject Freemarker template syntax.
Freemarker Sandbox Configuration
allConfigure Freemarker with restricted template processing and disable dangerous directives.
🧯 If You Can't Patch
- Restrict network access to Datart instances using firewalls and only allow trusted IP addresses.
- Implement strong authentication mechanisms and monitor for suspicious authentication attempts.
🔍 How to Verify
Check if Vulnerable:
Check Datart version via web interface or configuration files. If version is v1.0.0-rc.3, system is vulnerable.
Check Version:
Check application configuration or web interface for version information.
Verify Fix Applied:
Verify version has been updated beyond v1.0.0-rc.3 and test SQL script field with template injection payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL script submissions containing Freemarker template syntax
- Multiple failed authentication attempts followed by successful login and SQL script execution
Network Indicators:
- Unusual outbound connections from Datart server
- Traffic patterns indicating data exfiltration
SIEM Query:
source="datart" AND (message="*${*" OR message="*<#*" OR message="*@*" OR message="*?*" OR message="*new*" OR message="*exec*" OR message="*Runtime*" OR message="*ProcessBuilder*")