CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-49136
9.135.14%

Listmonk SSTI: When Helper Libraries Help You Get Hacked

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·5 min read·6 visits

WeaponizedCISA KEV Listed

Executive Summary (TL;DR)

Listmonk included the 'Sprig' template library without sanitization. This allowed any user with permission to create email templates to use the `{{ env }}` function. This function dumps the server's environment variables, handing over DB passwords, AWS keys, and config secrets to anyone who can preview an email. Fixed in v5.0.2.

A critical Server-Side Template Injection (SSTI) vulnerability in listmonk allows authenticated users to read host environment variables via the Sprig template library, exposing database credentials and cloud secrets.

Official Patches

listmonkOfficial Release Notes for v5.0.2

Fix Analysis (1)

Technical Appendix

CVSS Score
9.1/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Probability
35.14%
Top 3% most exploited
4,500
Estimated exposed hosts via Shodan

Affected Systems

listmonk < 5.0.2Docker deployments of listmonkKubernetes deployments of listmonk

Affected Versions Detail

Product
Affected Versions
Fixed Version
listmonk
knadh
>= 4.0.0, < 5.0.25.0.2
AttributeDetail
CWE IDCWE-1336 (Template Injection)
CVSS v3.19.1 (Critical)
Attack VectorNetwork (Authenticated)
EPSS Score0.35141 (High)
Exploit StatusWeaponized (Metasploit)
Affected ComponentSprig Template Library Integration

MITRE ATT&CK Mapping

T1552.001Unsecured Credentials: Credentials in Files
Credential Access
T1190Exploit Public-Facing Application
Initial Access
CWE-1336
Server-Side Template Injection

Improper Neutralization of Special Elements Used in a Template Engine (SSTI)

Known Exploits & Detection

MetasploitAuxiliary module to extract environment variables via listmonk SSTI
GitHubVendor advisory and PoC details
NucleiDetection Template Available

Vulnerability Timeline

Vulnerability Discovered
2025-05-25
Patch Commit Merged
2025-06-08
CVE Published
2025-06-09
Metasploit Module Released
2025-10-09

References & Sources

  • [1]GitHub Security Advisory
  • [2]Sprig Template Library Documentation

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.