Upstream information
CVE-2025-49136 at MITRE
Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the `env` and `expandenv` template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables. Users should upgrade to v5.0.2 to mitigate the issue.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
CVSS v3 Scores
| CVSS detail | CNA (GitHub) |
| Base Score | 9 |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | Required |
| Scope | Changed |
| Confidentiality Impact | High |
| Integrity Impact | High |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) | Fixed package version(s) | References |
| Container suse/sl-micro/6.0/baremetal-os-container:latest | kernel-firmware-all >= 20241128-slfo.1.1_2.1
kernel-firmware-amdgpu >= 20241128-slfo.1.1_2.1
kernel-firmware-ath10k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath11k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath12k >= 20241128-slfo.1.1_2.1
kernel-firmware-atheros >= 20241128-slfo.1.1_2.1
kernel-firmware-bluetooth >= 20241128-slfo.1.1_2.1
kernel-firmware-bnx2 >= 20241128-slfo.1.1_2.1
kernel-firmware-brcm >= 20241128-slfo.1.1_2.1
kernel-firmware-chelsio >= 20241128-slfo.1.1_2.1
kernel-firmware-dpaa2 >= 20241128-slfo.1.1_2.1
kernel-firmware-i915 >= 20241128-slfo.1.1_2.1
kernel-firmware-intel >= 20241128-slfo.1.1_2.1
kernel-firmware-iwlwifi >= 20241128-slfo.1.1_2.1
kernel-firmware-liquidio >= 20241128-slfo.1.1_2.1
kernel-firmware-marvell >= 20241128-slfo.1.1_2.1
kernel-firmware-media >= 20241128-slfo.1.1_2.1
kernel-firmware-mediatek >= 20241128-slfo.1.1_2.1
kernel-firmware-mellanox >= 20241128-slfo.1.1_2.1
kernel-firmware-mwifiex >= 20241128-slfo.1.1_2.1
kernel-firmware-network >= 20241128-slfo.1.1_2.1
kernel-firmware-nfp >= 20241128-slfo.1.1_2.1
kernel-firmware-nvidia >= 20241128-slfo.1.1_2.1
kernel-firmware-platform >= 20241128-slfo.1.1_2.1
kernel-firmware-prestera >= 20241128-slfo.1.1_2.1
kernel-firmware-qcom >= 20241128-slfo.1.1_2.1
kernel-firmware-qlogic >= 20241128-slfo.1.1_2.1
kernel-firmware-radeon >= 20241128-slfo.1.1_2.1
kernel-firmware-realtek >= 20241128-slfo.1.1_2.1
kernel-firmware-serial >= 20241128-slfo.1.1_2.1
kernel-firmware-sound >= 20241128-slfo.1.1_2.1
kernel-firmware-ti >= 20241128-slfo.1.1_2.1
kernel-firmware-ueagle >= 20241128-slfo.1.1_2.1
kernel-firmware-usb-network >= 20241128-slfo.1.1_2.1
| |
Image SLE-Micro
Image SLE-Micro-Azure
Image SLE-Micro-BYOS
Image SLE-Micro-BYOS-Azure | python311-dnspython >= 2.4.2-2.1
| |
| SUSE Linux Enterprise Server 16.0 | govulncheck-vulndb >= 0.0.20250814T182633-160000.1.2
| Patchnames: SUSE Linux Enterprise Server 16.0 GA govulncheck-vulndb-0.0.20250814T182633-160000.1.2 |
| openSUSE Tumbleweed | govulncheck-vulndb >= 0.0.20250612T141001-1.1
| Patchnames: openSUSE-Tumbleweed-2025-15225 |
SUSE Timeline for this CVE
CVE page created: Mon Jun 9 20:01:30 2025
CVE page last modified: Wed Feb 18 20:47:12 2026