CVE-2025-70830

Datart · Datart (using Freemarker engine)

Datart v1.0.0-rc.3 is vulnerable to Server-Side Template Injection (SSTI) in its Freemarker engine, allowing authenticated attackers to execute arbitrary code.

Executive summary

Datart is susceptible to a critical Server-Side Template Injection vulnerability that allows authenticated users to execute remote code through the SQL script field.

Vulnerability

An authenticated attacker can inject malicious Freemarker template syntax into the SQL script field of the application. Because the engine does not properly sanitize this input, it executes the injected code on the server hosting the Datart application.

Business impact

A successful SSTI attack allows an attacker to execute arbitrary code with the permissions of the application server. With a CVSS score of 9.9, this vulnerability poses a catastrophic risk to data confidentiality and system integrity, potentially leading to a full database or server breach.

Remediation

Immediate Action: Update Datart to the latest available version that includes patches for Freemarker template injection.

Proactive Monitoring: Inspect SQL script logs for unusual template syntax (e.g., ${...}) and monitor the server for unauthorized outbound network connections or shell activity.

Compensating Controls: Implement strict input validation and use a security manager to restrict the capabilities of the Freemarker template engine.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The high CVSS score and the potential for remote code execution make this a top-priority fix. Organizations using Datart must apply the necessary updates immediately to protect their data visualization environments from compromise.