Skyvern Security Chaos: Remote Code Execution Vulnerability Unleashed! 🚨
Skyvern’s Workflow Editor has a tiny hiccup: it allows prompt injection via Jinja2, enabling attackers with low privileges to execute remote code. So, if you’re running Skyvern version 0.1.85 or earlier, it’s time for a quick update—or risk turning your server into a hacker’s playground!

Hot Take:
Skyvern’s latest vulnerability is like leaving your front door wide open while announcing, “Come on in, hackers!” With the ability to execute remote code via the Jinja2 template syntax, this is less of a software bug and more of an enthusiastic invitation to chaos. CVE-2025-49619 is like a blockbuster summer movie: explosive, full of action, and definitely not something you want to miss.
Key Points:
- Skyvern’s Workflow Editor is vulnerable to remote code execution (RCE) via Server-Side Template Injection (SSTI).
- The vulnerability affects versions of Skyvern before 0.1.85, specifically before commit db856cd.
- Attackers can inject malicious code using Jinja2 template syntax.
- The exploit allows for a reverse shell connection via crafted payloads.
- Skyvern users are advised to update to the latest version immediately.
Already a member? Log in here