CVE-2025-70073
Unknown Unknown - Not Provided
Remote Code Execution via Template Creation in ChestnutCMS

Publication date: 2026-02-05

Last updated on: 2026-02-12

Assigner: MITRE

Description
An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
1000mz chestnutcms to 1.5.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-70073 is a Server-Side Template Injection (SSTI) vulnerability in ChestnutCMS versions up to 1.5.8. It occurs because the system allows users with template creation or editing permissions to save arbitrary FreeMarker expressions into template files without proper sandboxing or security restrictions.

When these templates are rendered by the CoreController on certain routes, such as /cms/preview/*, the malicious FreeMarker expressions are executed. Attackers can use the ${...} syntax to insert payloads that execute arbitrary template code.

If the FreeMarker configuration permits method execution, this can lead to remote code execution on the server, depending on the deployment environment and JVM security policies.

The exploitation involves creating or editing templates at /admin/configs/template, assigning the malicious template to a site at /admin/configs/site, and previewing the site to trigger the vulnerable rendering.


How can this vulnerability impact me? :

This vulnerability allows attackers with template editing permissions to execute arbitrary code on the server hosting ChestnutCMS.

Remote code execution can lead to full compromise of the server, including unauthorized access to data, modification or deletion of content, installation of malware, or use of the server as a pivot point for further attacks.

The impact depends on the deployment environment and security policies but can be severe, potentially affecting the confidentiality, integrity, and availability of the system and its data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for the presence of arbitrary FreeMarker expressions in templates created or edited via the administrator backend, especially those using the ${...} syntax.'}, {'type': 'paragraph', 'content': 'Specifically, you can audit templates in the /admin/configs/template section for suspicious FreeMarker code that could be executed during rendering.'}, {'type': 'paragraph', 'content': 'Additionally, monitoring HTTP requests to routes like /cms/preview/* and /admin/configs/template for unusual or unexpected template creation or preview actions can help detect exploitation attempts.'}, {'type': 'paragraph', 'content': 'While no specific commands are provided, you can use commands to search for suspicious template content on the server, for example:'}, {'type': 'list_item', 'content': "grep -r '\\${.*}' /path/to/chestnutcms/templates/"}, {'type': 'list_item', 'content': 'Check web server logs for POST or PUT requests to /admin/configs/template or /admin/configs/site endpoints that include suspicious template code.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the template creation and editing functions in the administrator backend to trusted users only.

Avoid allowing untrusted users to create or edit templates, as this is the vector for exploitation.

If possible, disable or restrict the rendering of templates that contain arbitrary FreeMarker expressions, or apply sandboxing to the FreeMarker template engine to prevent execution of unsafe expressions.

Monitor and audit template changes and site previews closely for suspicious activity.

Finally, update ChestnutCMS to a version later than 1.5.8 once a patch is available to fully resolve the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart