Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amidaware:tactical_rmm:*:*:*:*:*:*:*:* |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amidaware
Amidaware tactical Rmm |
|
| Vendors & Products |
Amidaware
Amidaware tactical Rmm |
Thu, 29 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1336 | |
| Metrics |
cvssV3_1
|
Thu, 29 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-29T21:29:11.391Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69516
Updated: 2026-01-29T21:26:14.291Z
Status : Analyzed
Published: 2026-01-29T20:16:09.537
Modified: 2026-02-13T20:33:25.163
Link: CVE-2025-69516
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:44Z