Critical (9.9)

CVE-2025-70830: [PoC]

CVE-2025-70830

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker ...

Overview

A critical security vulnerability has been identified in Datart, an open-source data visualization platform. This flaw allows an authenticated attacker to execute arbitrary code on the server hosting the application, potentially leading to a complete system compromise.

Vulnerability Explanation

In simple terms, the application uses a template engine (Freemarker) to dynamically generate content. A specific input field, intended for SQL scripts, does not properly validate or sanitize user input. An attacker with a valid user account can inject malicious template code into this field. The server then processes this code as part of the template, mistakenly executing the attacker’s commands instead of treating them as plain data. This type of attack is known as Server-Side Template Injection (SSTI).

Potential Impact

The impact of this vulnerability is severe. A successful exploit could allow an attacker to:

  • Execute any command or code on the underlying server operating system.
  • Steal, modify, or delete sensitive data from the server or connected databases.
  • Install malware or create a persistent backdoor for ongoing access.
  • Use the compromised server as a launch point for attacks on other internal systems.

Given that exploitation requires only a standard authenticated account, the risk to affected deployments is very high.

Remediation and Mitigation

The most effective action is to apply the official patch immediately.

  1. Primary Remediation: Upgrade Datart to a patched version as soon as it is released by the vendor. Monitor the official Datart GitHub repository or security advisories for the fixed version addressing CVE-2025-70830.

  2. Immediate Mitigation (If Patching is Delayed):

    • Restrict Access: Tighten network controls to limit access to the Datart application to only trusted users and IP addresses.
    • Review Permissions: Audit user accounts and enforce the principle of least privilege. Ensure no unnecessary accounts have write or execute permissions, especially for the SQL script functionality.
    • Monitor Logs: Closely monitor application and system logs for any unusual activity, particularly unexpected processes or file modifications originating from the Datart service account.

Note: Input validation at the application level is not a sufficient mitigation for this specific flaw once it is present. Patching the core vulnerability is the only complete solution.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
xiaoxiaoranxxx/CVE-2025-70830

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker

★ 5

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.