Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jc7g-x28f-3v3h

Опубликовано: 09 июн. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9

Описание

listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user

Summary

The env and expandenv template functions which is enabled by default in Sprig enables capturing of env variables on the host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the {{ env }} template expression to capture sensitive environment variables.

Upgrade to v5.0.2 to mitigate.


Demonstration

Description

A critical template injection vulnerability exists in Listmonk's campaign preview functionality that allows authenticated users with minimal privileges (campaigns:get & campaigns:get_all) to extract sensitive system data, including database credentials, SMTP passwords, and admin credentials due to some dangerous function being allowed.

Proof of Concept

  • Create a user and give him campaigns:get and campaigns:get_all privileges

image

  • Now login with that user, go to any campaign, go the Content section and here lies the vulnerability, we're able to execute template content which allows us to get environment variables, execute Sprig functions...

  • Now in the text field you can input the following and press Preview:

{{ env "AWS_KEY" }} {{ env "LISTMONK_db__user" }} {{ env "LISTMONK_db__password" }}

image

Preview:

image

I had the AWS_KEY variable set like that to confirm the vulnerability:

image

Impact

  • Through these environment variables the attacker can access, they can fully compromise the database, cloud accounts, admin credentials, and more depending on what was setup leading to total system takeover and data breach.

Suggested Fix

  • Blacklist some function for templates like env, expandEnv and fail as they can be used to leak environment variables which leads to a full takeover.

Пакеты

Наименование

github.com/knadh/listmonk

go
Затронутые версииВерсия исправления

>= 4.0.0, < 5.0.2

5.0.2

EPSS

Процентиль: 97%
0.35141
Средний

9 Critical

CVSS3

Дефекты

CWE-1336

Связанные уязвимости

CVSS3: 9
nvd
8 месяцев назад

listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the `env` and `expandenv` template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables. Users should upgrade to v5.0.2 to mitigate the issue.

EPSS

Процентиль: 97%
0.35141
Средний

9 Critical

CVSS3

Дефекты

CWE-1336