A critical remote code execution vulnerability (CVE-2025-34300) has been discovered in Lighthouse Studio, a survey software platform developed by Sawtooth Software. This vulnerability affects the Perl CGI scripts that power web-based surveys, potentially exposing thousands of hosting servers to complete compromise. The flaw resides in the server-side components, where a templating engine processes user input without proper sanitization. Security researchers found that the software’s templating system evaluates content between [% %] markers as executable Perl code, creating a direct pathway for remote code execution. This issue amplifies the potential attack surface and complicates remediation efforts due to the proliferation of vulnerable script instances across web infrastructures.
Source: https://cybersecuritynews.com/lighthouse-studio-rce-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/sawtooth-software
"id": "saw719072225",
"linkid": "sawtooth-software",
"type": "Vulnerability",
"date": "7/2025",
"severity": "100",
"impact": "",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': 'Survey Software',
'name': 'Sawtooth Software',
'type': 'Software Developer'}],
'attack_vector': 'Web-based survey links',
'date_publicly_disclosed': '2025-07-09',
'description': 'A critical remote code execution vulnerability '
'(CVE-2025-34300) has been discovered in Lighthouse Studio, a '
'survey software platform developed by Sawtooth Software. The '
'flaw affects Perl CGI scripts that power web-based surveys, '
'potentially exposing thousands of hosting servers to complete '
'compromise by attackers who possess a survey link.',
'impact': {'systems_affected': 'Thousands of hosting servers'},
'initial_access_broker': {'entry_point': 'Survey links'},
'post_incident_analysis': {'corrective_actions': ['Update to version 9.16.14'],
'root_causes': 'Inadequate input sanitization in '
'the templating engine'},
'recommendations': ['Organizations should immediately update to the patched '
'version 9.16.14 to prevent potential compromise of their '
'hosting infrastructure.'],
'references': [{'source': 'Assetnote'}],
'response': {'remediation_measures': ['Update to version 9.16.14']},
'title': 'Critical Remote Code Execution Vulnerability in Lighthouse Studio',
'type': 'Remote Code Execution',
'vulnerability_exploited': 'CVE-2025-34300'}