Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-49136 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: listmonk < v5.0.2 allows template functions to capture environment variables. πŸ“‰ **Consequences**: Sensitive information leakage. Attackers can expose critical system data through malicious templates.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-1336 (Improper Restriction of Renderable Code Regions). The flaw lies in how template functions handle environment variable capture, allowing unintended data exposure.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users running **listmonk** versions **prior to 5.0.2**. Vendor: **knadh**. This applies to self-hosted, high-performance newsletter managers.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With access, hackers can achieve **High Confidentiality**, **High Integrity**, and **High Availability** impact. They can read sensitive env vars and potentially modify system state.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **Medium**. Requires **Low Complexity** and **Network** access. However, it needs **Low Privileges** (authenticated user) and **User Interaction** (UI:R).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` field is empty. No public Proof-of-Concept or wild exploitation code is currently available in the provided data.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your listmonk version. If it is **< 5.0.2**, you are vulnerable. Scan for custom templates that might inject environment variable references.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. Patched in **v5.0.2**. See GitHub Advisory GHSA-jc7g-x28f-3v3h and release notes for the official resolution.

Q9What if no patch? (Workaround)

πŸ› οΈ **No Patch Workaround**: Restrict template editing permissions. Disable custom template injection if possible. Isolate the instance from sensitive environment variables.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is high (implied by C:H/I:H/A:H). Immediate upgrade to v5.0.2+ is recommended to prevent sensitive data leaks.