Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-49142

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-10 Jun, 2025 | 15:40
Updated At-10 Jun, 2025 | 17:10
Rejected At-
Credits

Nautobot vulnerable to secrets exposure and data manipulation through Jinja2 templating

Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions prior to 2.4.10 or prior to 1.6.32 are potentially affected. Due to insufficient security configuration of the Jinja2 templating feature used in computed fields, custom links, etc. in Nautobot, a malicious user could configure this feature set in ways that could expose the value of Secrets defined in Nautobot when the templated content is rendered or that could call Python APIs to modify data within Nautobot when the templated content is rendered, bypassing the object permissions assigned to the viewing user. Nautobot versions 1.6.32 and 2.4.10 will include fixes for the vulnerability. The vulnerability can be partially mitigated by configuring object permissions appropriately to limit certain actions to only trusted users.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:10 Jun, 2025 | 15:40
Updated At:10 Jun, 2025 | 17:10
Rejected At:
▼CVE Numbering Authority (CNA)
Nautobot vulnerable to secrets exposure and data manipulation through Jinja2 templating

Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions prior to 2.4.10 or prior to 1.6.32 are potentially affected. Due to insufficient security configuration of the Jinja2 templating feature used in computed fields, custom links, etc. in Nautobot, a malicious user could configure this feature set in ways that could expose the value of Secrets defined in Nautobot when the templated content is rendered or that could call Python APIs to modify data within Nautobot when the templated content is rendered, bypassing the object permissions assigned to the viewing user. Nautobot versions 1.6.32 and 2.4.10 will include fixes for the vulnerability. The vulnerability can be partially mitigated by configuring object permissions appropriately to limit certain actions to only trusted users.

Affected Products
Vendor
nautobot
Product
nautobot
Versions
Affected
  • < 1.6.32
  • >= 2.0.0, < 2.4.10
Problem Types
TypeCWE IDDescription
CWECWE-1336CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Type: CWE
CWE ID: CWE-1336
Description: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Metrics
VersionBase scoreBase severityVector
4.06.0MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:L
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx
x_refsource_CONFIRM
https://github.com/nautobot/nautobot/pull/7417
x_refsource_MISC
https://github.com/nautobot/nautobot/pull/7429
x_refsource_MISC
https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description
x_refsource_MISC
https://jinja.palletsprojects.com/en/stable/sandbox
x_refsource_MISC
Hyperlink: https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/nautobot/nautobot/pull/7417
Resource:
x_refsource_MISC
Hyperlink: https://github.com/nautobot/nautobot/pull/7429
Resource:
x_refsource_MISC
Hyperlink: https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description
Resource:
x_refsource_MISC
Hyperlink: https://jinja.palletsprojects.com/en/stable/sandbox
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:10 Jun, 2025 | 16:15
Updated At:21 Aug, 2025 | 22:36

Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions prior to 2.4.10 or prior to 1.6.32 are potentially affected. Due to insufficient security configuration of the Jinja2 templating feature used in computed fields, custom links, etc. in Nautobot, a malicious user could configure this feature set in ways that could expose the value of Secrets defined in Nautobot when the templated content is rendered or that could call Python APIs to modify data within Nautobot when the templated content is rendered, bypassing the object permissions assigned to the viewing user. Nautobot versions 1.6.32 and 2.4.10 will include fixes for the vulnerability. The vulnerability can be partially mitigated by configuring object permissions appropriately to limit certain actions to only trusted users.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.0MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CPE Matches

networktocode
networktocode
>>nautobot>>Versions before 1.6.32(exclusive)
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
networktocode
networktocode
>>nautobot>>Versions from 2.0.0(inclusive) to 2.4.10(exclusive)
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1336Primarysecurity-advisories@github.com
CWE ID: CWE-1336
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-descriptionsecurity-advisories@github.com
Product
https://github.com/nautobot/nautobot/pull/7417security-advisories@github.com
Patch
https://github.com/nautobot/nautobot/pull/7429security-advisories@github.com
Patch
https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpxsecurity-advisories@github.com
Vendor Advisory
https://jinja.palletsprojects.com/en/stable/sandboxsecurity-advisories@github.com
Product
Hyperlink: https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description
Source: security-advisories@github.com
Resource:
Product
Hyperlink: https://github.com/nautobot/nautobot/pull/7417
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/nautobot/nautobot/pull/7429
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://jinja.palletsprojects.com/en/stable/sandbox
Source: security-advisories@github.com
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2024-34710
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.30% / 53.19%
||
7 Day CHG~0.00%
Published-20 May, 2024 | 21:59
Updated-02 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wiki.js Stored XSS through Client Side Template Injection

Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the payload. This was possible through the injection of a invalid HTML tag with a template injection payload on the next line. This vulnerability is fixed in 2.5.303.

Action-Not Available
Vendor-requarksrequarks
Product-wikiwiki.js
CWE ID-CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
Details not found