High severity8.5NVD Advisory· Published Jun 7, 2025· Updated Apr 15, 2026
CVE-2025-49619
CVE-2025-49619
Description
Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
skyvernPyPI | <= 0.2.0 | — |
Patches
1db856cd8433aVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- github.com/advisories/GHSA-h92g-3xc3-ww2rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-49619ghsaADVISORY
- cristibtz.blog/posts/CVE-2025-49619ghsaWEB
- cristibtz.github.io/posts/CVE-2025-49619ghsaWEB
- github.com/Skyvern-AI/skyvern/commit/db856cd8433a204c8b45979c70a4da1e119d949dnvdWEB
- www.exploit-db.com/exploits/52335nvdWEB
- cristibtz.blog/posts/CVE-2025-49619/nvd
- cristibtz.github.io/posts/CVE-2025-49619/nvd
News mentions
0No linked articles in our index yet.