Jinja2 Template Injection Vulnerability in Tournatrack by Sarrionandia
CVE-2025-3805
Key Information:
- Vendor
- Sarrionandia
- Status
- Tournatrack
- Vendor
- CVE Published:
- 19 April 2025
Badges
Summary
A critical vulnerability found in Sarrionandia's Tournatrack exposes the system to potential injection attacks through the Jinja2 Template Handler's file, check_id.py. An attacker can exploit this vulnerability by manipulating the argument ID, allowing unauthorized command execution on the local host. This security flaw has been publicly disclosed, raising concerns regarding its usage in the wild. As this product lacks versioning, it is difficult to determine safe versions. Developers and system administrators must take immediate action to secure their installations against this threat.
Affected Version(s)
tournatrack 4c13a23f43da5317eea4614870a7a8510fc540ec
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved