module
Tactical RMM Jinja2 SSTI Remote Code Execution
| Disclosed | Created |
|---|---|
| Jan 29, 2026 | Mar 5, 2026 |
Disclosed
Jan 29, 2026
Created
Mar 5, 2026
Description
This module exploits a Server-Side Template Injection (SSTI) vulnerability
in Tactical RMM versions prior to 1.4.0 (CVE-2025-69516).
The reporting template preview endpoint passes user-controlled Jinja2 template
content to Environment.from_string() without sandboxing, allowing arbitrary
Python code execution on the server.
Valid credentials are required. The module authenticates to obtain a Knox API
token, then delivers a Jinja2 SSTI payload through the template preview
functionality to achieve OS command execution.
The vulnerability was silently patched in version 1.4.0 by switching from
jinja2.Environment to jinja2.sandbox.SandboxedEnvironment.
in Tactical RMM versions prior to 1.4.0 (CVE-2025-69516).
The reporting template preview endpoint passes user-controlled Jinja2 template
content to Environment.from_string() without sandboxing, allowing arbitrary
Python code execution on the server.
Valid credentials are required. The module authenticates to obtain a Knox API
token, then delivers a Jinja2 SSTI payload through the template preview
functionality to achieve OS command execution.
The vulnerability was silently patched in version 1.4.0 by switching from
jinja2.Environment to jinja2.sandbox.SandboxedEnvironment.
Authors
Gabriel Gomes
Valentin Lobstein [email protected]
Valentin Lobstein [email protected]
Platform
Linux,Python,Unix
Architectures
python, cmd, x64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.