CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-49136: listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user

9.1 CVSS

Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the `env` and `expandenv` template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables. Users should upgrade to v5.0.2 to mitigate the issue.

Classification

CVE ID: CVE-2025-49136

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem Types

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Affected Products

Vendor: knadh

Product: listmonk

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 7.6% (scored less or equal to compared to others)

EPSS Date: 2025-07-05 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-49136
https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h
https://github.com/knadh/listmonk/commit/d27d2c32cf3af2d0b24e29ea5a686ba149b49b3e
https://github.com/knadh/listmonk/releases/tag/v5.0.2

Timeline