module

Tactical RMM Jinja2 SSTI Remote Code Execution

Disclosed
Jan 29, 2026
Created
Mar 5, 2026

Description

This module exploits a Server-Side Template Injection (SSTI) vulnerability
in Tactical RMM versions prior to 1.4.0 (CVE-2025-69516).

The reporting template preview endpoint passes user-controlled Jinja2 template
content to Environment.from_string() without sandboxing, allowing arbitrary
Python code execution on the server.

Valid credentials are required. The module authenticates to obtain a Knox API
token, then delivers a Jinja2 SSTI payload through the template preview
functionality to achieve OS command execution.

The vulnerability was silently patched in version 1.4.0 by switching from
jinja2.Environment to jinja2.sandbox.SandboxedEnvironment.

Authors

Gabriel Gomes
Valentin Lobstein [email protected]

Platform

Linux,Python,Unix

Architectures

python, cmd, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/tacticalrmm_ssti_rce_cve_2025_69516
msf exploit(tacticalrmm_ssti_rce_cve_2025_69516) > show targets
...targets...
msf exploit(tacticalrmm_ssti_rce_cve_2025_69516) > set TARGET < target-id >
msf exploit(tacticalrmm_ssti_rce_cve_2025_69516) > show options
...show and set options...
msf exploit(tacticalrmm_ssti_rce_cve_2025_69516) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.