<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ssti — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ssti/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 21:24:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ssti/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kirby CMS Server-Side Template Injection via Double Template Resolution</title><link>https://feed.craftedsignal.io/briefs/2026-04-kirby-ssti/</link><pubDate>Thu, 23 Apr 2026 21:24:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kirby-ssti/</guid><description>A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.</description><content:encoded><![CDATA[<p>A server-side template injection (SSTI) vulnerability has been identified in Kirby CMS affecting sites using option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) with options sourced from queries or APIs where the values cannot be fully trusted. This vulnerability, discovered and reported by @offset, stems from a double resolution of templates within the options rendering logic. An attacker with Panel access or through user interaction can inject malicious query templates. This can lead to unauthorized access to sensitive information (like user passwords) or malicious modification of site content. The vulnerability affects Kirby CMS versions prior to 4.9.0 and versions between 5.0.0 and 5.4.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Kirby Panel, or convinces a user with access to interact with a malicious element.</li>
<li>The attacker identifies a page or blueprint using dynamic options for form fields (checkboxes, selects, etc.) sourced from a query or API.</li>
<li>The attacker injects a malicious query template, such as <code>{{ users.first.password }}</code> or <code>{{ page.delete }}</code>, into a page title or data returned from an external API.</li>
<li>The administrator or another privileged user navigates to the affected Panel view, triggering the rendering of the form field with the injected malicious template.</li>
<li>The Kirby CMS options logic improperly double-resolves the template, executing the injected query.</li>
<li>The attacker gains access to sensitive information, such as user passwords, or triggers unauthorized actions like page deletion, depending on the injected query.</li>
<li>The attacker escalates privileges by exploiting the compromised user&rsquo;s session or by directly accessing sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow attackers to access sensitive site information, such as user credentials, or perform unauthorized actions, like modifying or deleting content. This could lead to a complete compromise of the Kirby CMS website and its data. The vulnerability specifically targets sites that leverage dynamic options for form fields, making them susceptible to malicious query injection. Sites running vulnerable versions of Kirby CMS are at risk of information disclosure and unauthorized modification.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby CMS version 4.9.0 or 5.4.0 or later to patch the vulnerability as described in the advisory (<a href="https://github.com/advisories/GHSA-jcjw-58rv-c452">https://github.com/advisories/GHSA-jcjw-58rv-c452</a>).</li>
<li>Apply input validation and sanitization to all data sources used for dynamic options to prevent the injection of malicious templates and mitigate CVE-2026-34587.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing template syntax or attempts to access sensitive information, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssti</category><category>kirby</category><category>template-injection</category></item><item><title>BentoML SSTI via Unsandboxed Jinja2 in Dockerfile Generation</title><link>https://feed.craftedsignal.io/briefs/2024-02-bentoml-ssti/</link><pubDate>Fri, 03 Apr 2026 23:14:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-bentoml-ssti/</guid><description>BentoML versions 1.4.37 and earlier are vulnerable to server-side template injection (SSTI), where the Dockerfile generation function uses an unsandboxed jinja2.Environment allowing arbitrary Python code execution on the host machine when a malicious bento archive is imported and containerized, bypassing container isolation and potentially granting full access to the host filesystem and environment variables.</description><content:encoded><![CDATA[<p>BentoML versions 1.4.37 and earlier contain a critical vulnerability related to server-side template injection (SSTI). The vulnerability stems from the use of an unsandboxed Jinja2 environment within the <code>generate_containerfile()</code> function, which is responsible for creating Dockerfiles. By crafting a malicious bento archive containing a specially crafted <code>dockerfile_template</code>, an attacker can inject arbitrary Python code that executes directly on the host machine when a victim imports and containerizes the bento using <code>bentoml containerize</code>. This vulnerability bypasses all container isolation mechanisms and gives the attacker full access to the host&rsquo;s filesystem, environment variables, and potentially other sensitive information. The lack of input validation during the import process allows the malicious template to be embedded within the bento archive undetected until the containerization process.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious <code>bentofile.yaml</code> file containing a <code>dockerfile_template</code> directive pointing to a Jinja2 template with an SSTI payload.</li>
<li>The attacker builds a bento using <code>bentoml build</code>, which copies the malicious template into the bento archive at <code>env/docker/Dockerfile.template</code>.</li>
<li>The attacker exports the bento as a <code>.bento</code> or <code>.tar.gz</code> archive and distributes it to victims.</li>
<li>A victim imports the malicious bento archive using <code>bentoml import bento.tar</code>. No validation of the template content is performed during the import.</li>
<li>The victim attempts to containerize the imported bento using <code>bentoml containerize</code>, triggering the <code>construct_containerfile()</code> function.</li>
<li>The <code>construct_containerfile()</code> function detects the presence of the <code>Dockerfile.template</code> and sets the <code>dockerfile_template</code> attribute in the Docker options.</li>
<li>The <code>generate_containerfile()</code> function loads the attacker-controlled template into an unsandboxed Jinja2 environment.</li>
<li>The template is rendered, resulting in arbitrary Python code execution on the victim&rsquo;s host machine, outside of any containerized environment. This allows the attacker to achieve full host compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows arbitrary code execution on the host machine of any user who imports and containerizes the malicious bento archive. This provides the attacker with: full access to the host filesystem, the ability to install backdoors or pivot to other systems, and access to sensitive information such as credentials and API keys stored in environment variables. Due to the placement of the malicious code within a bento archive, and the nature of the containerize operation, users may be unaware of the risk and impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patched version of BentoML (later than 1.4.37) to remediate CVE-2026-35044.</li>
<li>Deploy the Sigma rule &ldquo;Detect BentoML SSTI Payload in Dockerfile Template&rdquo; to identify potentially malicious Jinja2 templates being written to disk.</li>
<li>Monitor process creation events for the execution of suspicious commands originating from the <code>bentoml</code> process, particularly after importing a bento archive, to catch potential exploitation attempts using the rule &ldquo;Detect Suspicious Process Execution from BentoML&rdquo;.</li>
<li>Implement strict input validation and sanitization for any user-provided templates or configuration files to prevent server-side template injection vulnerabilities, as described in the overview.</li>
<li>Review and restrict the extensions used within the Jinja2 environment to only those absolutely necessary for Dockerfile generation, following the recommended fix in the source.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>bentoml</category><category>code-execution</category><category>docker</category></item><item><title>Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)</title><link>https://feed.craftedsignal.io/briefs/2026-03-ssti-wordpress/</link><pubDate>Mon, 30 Mar 2026 22:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ssti-wordpress/</guid><description>The Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).</description><content:encoded><![CDATA[<p>The Contact Form by Supsystic plugin, a popular WordPress plugin, is susceptible to a critical Server-Side Template Injection (SSTI) vulnerability, identified as CVE-2026-4257. This vulnerability affects all versions up to and including 1.7.36. The root cause lies in the plugin&rsquo;s use of the Twig template engine (<code>Twig_Loader_String</code>) without proper sandboxing. This, combined with the <code>cfsPreFill</code> functionality, allows unauthenticated attackers to inject arbitrary Twig expressions into form…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>wordpress</category><category>rce</category><category>twig</category></item><item><title>Giskard-agents ChatWorkflow.chat() Server-Side Template Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-giskard-ssti/</link><pubDate>Fri, 27 Mar 2026 22:17:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-giskard-ssti/</guid><description>Giskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The giskard-agents library, specifically versions 0.3.3 and earlier, along with versions 1.0.1a1 through 1.0.2a1, contains a critical vulnerability related to server-side template injection. The <code>ChatWorkflow.chat()</code> method within the library directly passes user-provided strings to a non-sandboxed Jinja2 Environment. This design flaw allows a malicious actor to inject arbitrary Jinja2 templates into the message, which, when rendered, can lead to remote code execution (RCE) on the server hosting the application. This vulnerability exists because the <code>chat()</code> method, intended for processing user input, inadvertently interprets the input as a Jinja2 template due to the usage of <code>_inline_env.from_string()</code>. Defenders should be aware of applications using the vulnerable <code>chat()</code> method which creates the attack surface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious string containing a Jinja2 payload designed for RCE.</li>
<li>The attacker inputs the malicious string into a user interface or API endpoint that utilizes the <code>ChatWorkflow.chat()</code> method.</li>
<li>The application passes the attacker-controlled string to the <code>ChatWorkflow.chat()</code> method.</li>
<li><code>ChatWorkflow.chat()</code> creates a <code>MessageTemplate</code> object with the attacker&rsquo;s string as the <code>content_template</code>.</li>
<li>The <code>render()</code> method of the <code>MessageTemplate</code> object calls <code>_inline_env.from_string()</code> on the attacker-controlled string, creating a Jinja2 template.</li>
<li>The <code>template.render()</code> method is invoked, executing the attacker&rsquo;s Jinja2 payload due to the non-sandboxed Jinja2 Environment.</li>
<li>The attacker&rsquo;s payload leverages Jinja2 class traversal to gain access to sensitive modules like <code>os</code>.</li>
<li>The attacker executes arbitrary system commands via <code>os.popen()</code> (or equivalent), achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary system commands on the server hosting the affected application. This could lead to complete compromise of the server, including data theft, modification, or destruction. The severity of the impact is critical, potentially affecting any application that relies on giskard-agents for chatbot functionality and exposes the <code>ChatWorkflow.chat()</code> method to user input. Affected versions include giskard-agents &lt;=0.3.3 and 1.0.x alpha. Patched versions are giskard-agents 0.3.4 (stable) and 1.0.2b1 (pre-release).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade giskard-agents to version 0.3.4 or 1.0.2b1, which includes the fix mitigating the vulnerability described in this brief.</li>
<li>Deploy the Sigma rule <code>Detect Giskard Agents SSTI Attempt via Jinja2 Class Traversal</code> to detect exploitation attempts via <code>webserver</code> logs.</li>
<li>If upgrading is not immediately feasible, sanitize user inputs passed to the <code>ChatWorkflow.chat()</code> method to prevent Jinja2 template injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>jinja2</category><category>rce</category><category>giskard-agents</category><category>vulnerability</category></item><item><title>LiteLLM Server-Side Template Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-11-litellm-ssti/</link><pubDate>Tue, 05 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-litellm-ssti/</guid><description>A server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.</description><content:encoded><![CDATA[<p>A server-side template injection (SSTI) vulnerability has been identified in LiteLLM versions 1.80.5 up to, but not including, 1.83.7. This flaw resides within the <code>/prompts/test</code> endpoint, which processes user-supplied prompt templates. Due to insufficient input sanitization, a malicious actor with a valid proxy API key can inject arbitrary code into the template, leading to its execution within the LiteLLM Proxy process. This vulnerability was disclosed on April 24, 2026. Successful exploitation can compromise the proxy&rsquo;s environment, potentially exposing sensitive credentials like provider API keys and database passwords, or allowing arbitrary command execution on the host system. Organizations using affected versions of LiteLLM are at risk. The vulnerability is addressed in version 1.83.7-stable by implementing a sandboxed template renderer.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the LiteLLM proxy server using a valid API key.</li>
<li>The attacker crafts a malicious prompt template containing SSTI payloads.</li>
<li>The attacker sends a POST request to the <code>/prompts/test</code> endpoint, including the crafted template in the request body.</li>
<li>The LiteLLM proxy server receives the request and processes the template without proper sanitization.</li>
<li>The SSTI payload executes arbitrary code within the LiteLLM proxy process.</li>
<li>The attacker gains access to environment variables containing sensitive information, such as API keys and database credentials.</li>
<li>The attacker uses the exposed credentials to gain unauthorized access to external services or data.</li>
<li>The attacker executes arbitrary commands on the host system, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSTI vulnerability allows attackers to execute arbitrary code within the LiteLLM Proxy process. This can lead to the exposure of sensitive information such as API keys and database credentials, potentially enabling unauthorized access to other systems and data. Furthermore, attackers can execute arbitrary commands on the host, leading to full system compromise. The impact is significant for organizations relying on LiteLLM for managing and routing AI model requests, as it could result in data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version <code>1.83.7-stable</code> or later to patch the vulnerability, as this version implements a sandboxed template renderer (see Patches).</li>
<li>As a temporary workaround, block <code>POST /prompts/test</code> at your reverse proxy or API gateway to prevent exploitation attempts (see Workarounds).</li>
<li>Review and rotate API keys that should not have access to prompt management routes to limit the potential impact of compromised keys (see Workarounds).</li>
<li>Deploy the Sigma rule &ldquo;Detect LiteLLM SSTI Attempts via /prompts/test&rdquo; to your SIEM to identify potential exploitation attempts based on HTTP request patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssti</category><category>litellm</category><category>template-injection</category><category>code-execution</category></item><item><title>Thymeleaf Server-Side Template Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-thymeleaf-ssti/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-thymeleaf-ssti/</guid><description>A server-side template injection vulnerability exists in Thymeleaf versions up to 3.1.4.RELEASE due to improper neutralization of specific constructs, allowing the execution of potentially dangerous expressions in sandboxed contexts if unsanitized variables are passed to the template engine.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-41901, has been identified in Thymeleaf, a Java template engine, affecting versions up to and including 3.1.4.RELEASE. This vulnerability allows for Server-Side Template Injection (SSTI) due to the improper neutralization of specific syntax patterns within sandboxed expression execution. Specifically, the library fails to properly sanitize certain constructs, allowing potentially dangerous expressions to be executed even within supposedly restricted contexts. This poses a significant risk if application developers pass unsanitized variables to the template engine and these variables are then utilized in sandboxed areas within the templates. Successful exploitation can lead to arbitrary code execution on the server. All users of affected versions are strongly advised to upgrade to version 3.1.5.RELEASE as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using a vulnerable version of Thymeleaf (&lt;= 3.1.4.RELEASE).</li>
<li>The attacker locates a template within the application that uses Thymeleaf&rsquo;s expression evaluation within a sandboxed context.</li>
<li>The attacker identifies an input field or parameter that passes data to the Thymeleaf template engine.</li>
<li>The attacker crafts a malicious payload containing a Thymeleaf expression designed to bypass the sandbox restrictions. This payload may utilize specific syntax patterns not properly neutralized by the vulnerable Thymeleaf version.</li>
<li>The attacker injects the crafted payload into the identified input field.</li>
<li>The application processes the attacker-controlled input via the Thymeleaf template engine.</li>
<li>Due to the vulnerability, the malicious Thymeleaf expression is executed despite the intended sandboxing.</li>
<li>The attacker achieves arbitrary code execution on the server, potentially gaining full control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41901 can lead to complete system compromise. An attacker could potentially execute arbitrary code, install malware, steal sensitive data, or disrupt application services. The vulnerability affects any application using Thymeleaf versions up to 3.1.4.RELEASE, potentially impacting numerous organizations across various sectors. The lack of proper input sanitization is the root cause, which can be difficult to identify and mitigate without patching the underlying Thymeleaf library.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Thymeleaf to version 3.1.5.RELEASE or later to patch CVE-2026-41901.</li>
<li>If immediate patching is not feasible, review and sanitize all data passed to the Thymeleaf template engine to prevent the injection of malicious expressions. However, this workaround is not a complete solution and upgrading is strongly recommended.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Thymeleaf Template Injection Attempts&rdquo; to identify potential exploitation attempts in web server logs, focusing on HTTP requests containing suspicious patterns related to Thymeleaf expressions.</li>
<li>Enable verbose logging on your web servers to capture detailed information about HTTP requests and responses, which can aid in identifying and investigating potential template injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>template-injection</category><category>thymeleaf</category><category>cve-2026-41901</category></item><item><title>OpenMRS Stored Velocity SSTI to RCE via ConceptReferenceRange</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-ssti/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-ssti/</guid><description>OpenMRS is vulnerable to a Stored Velocity SSTI to RCE via ConceptReferenceRange, where the `ConceptReferenceRangeUtility.evaluateCriteria()` method evaluates database-stored criteria strings as Apache Velocity templates without a sandbox, allowing unrestricted Java reflection through template expressions, leading to persistent remote code execution and privilege escalation when a user with the `Manage Concepts` privilege stores a malicious Velocity template expression in a concept's reference range criteria field.</description><content:encoded><![CDATA[<p>OpenMRS is vulnerable to a critical security flaw stemming from the unsafe use of Apache Velocity templates. Specifically, the <code>ConceptReferenceRangeUtility.evaluateCriteria()</code> method processes database-stored criteria strings as Velocity templates without any sandbox restrictions. This allows for unrestricted Java reflection through template expressions. A user possessing the <code>Manage Concepts</code> privilege can inject a malicious Velocity template expression into a concept&rsquo;s reference range criteria field. This payload will then execute automatically whenever a user or an API call validates an observation against the compromised concept. This issue impacts OpenMRS versions 2.7.0 through 2.7.8, and 2.8.0 through 2.8.5. Successful exploitation allows an attacker to escalate privileges from content management to arbitrary code execution as the Tomcat application server process, with the potential for exfiltration of protected health information (PHI). The vulnerability is identified as CVE-2026-41258.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to an OpenMRS account with the <code>Manage Concepts</code> privilege.</li>
<li>The attacker navigates to the concept dictionary management interface.</li>
<li>The attacker locates a commonly used concept, such as one for a standard clinical measurement.</li>
<li>The attacker modifies the concept and injects a malicious Velocity template expression into the concept&rsquo;s reference range criteria field. The expression leverages Java reflection to execute arbitrary code.</li>
<li>The malicious template is saved and stored in the <code>concept_reference_range</code> database table.</li>
<li>A user or API call validates an observation against the affected concept, triggering the execution of the stored Velocity template.</li>
<li>The attacker achieves arbitrary code execution within the context of the Tomcat application server process.</li>
<li>The attacker can then perform actions such as installing a web shell for persistent access or exfiltrating patient data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows for persistent remote code execution on the OpenMRS server. The injected payload persists within the <code>concept_reference_range</code> database table (VARCHAR 65535). A single compromised concept, especially one used for common clinical measurements, can lead to the execution of the malicious payload on every subsequent observation validation across all users, API clients, and integrations. This affects all facilities using the compromised OpenMRS instance. The attacker can escalate privileges from content dictionary management to arbitrary code execution and potentially exfiltrate PHI data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenMRS to version 2.8.6 or 2.7.9 or later to patch CVE-2026-41258.</li>
<li>Restrict the <code>Manage Concepts</code> privilege to only authorized users, as mentioned in the advisory&rsquo;s workarounds.</li>
<li>Deploy the provided Sigma rule detecting Velocity template injection attempts to your SIEM and tune for your environment.</li>
<li>Implement database monitoring to detect unauthorized modifications to the <code>concept_reference_range</code> table to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>rce</category><category>velocity</category><category>openmrs</category></item></channel></rss>