CVE-2025-70830

9.9 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Template Injection vulnerability in Datart's Freemarker template engine that allows authenticated attackers to execute arbitrary code by injecting malicious template syntax into SQL script fields. Attackers can achieve remote code execution on affected systems. All users running vulnerable versions of Datart are affected.

💻 Affected Systems

Products:
  • Datart
Versions: v1.0.0-rc.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but default configurations may be vulnerable if authentication is enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Data breach, privilege escalation, and installation of cryptocurrency miners or ransomware on vulnerable systems.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and input validation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor the official Datart repository for updates and apply when released.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and sanitization for SQL script fields to reject Freemarker template syntax.

Freemarker Sandbox Configuration

all

Configure Freemarker with restricted template processing and disable dangerous directives.

🧯 If You Can't Patch

  • Restrict network access to Datart instances using firewalls and only allow trusted IP addresses.
  • Implement strong authentication mechanisms and monitor for suspicious authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check Datart version via web interface or configuration files. If version is v1.0.0-rc.3, system is vulnerable.

Check Version:

Check application configuration or web interface for version information.

Verify Fix Applied:

Verify version has been updated beyond v1.0.0-rc.3 and test SQL script field with template injection payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL script submissions containing Freemarker template syntax
  • Multiple failed authentication attempts followed by successful login and SQL script execution

Network Indicators:

  • Unusual outbound connections from Datart server
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="datart" AND (message="*${*" OR message="*<#*" OR message="*@*" OR message="*?*" OR message="*new*" OR message="*exec*" OR message="*Runtime*" OR message="*ProcessBuilder*")

🔗 References

📤 Share & Export