A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. By dynamically modifying the Velocity engine’s runtime configuration and reinitializing its Uberspect, a malicious actor can remove the introspector.restrict.classes and introspector.restrict.packages protections. Once these restrictions are cleared, the attacker can access arbitrary Java classes, including java.lang.Runtime, and execute arbitrary system commands under the privileges of the application process (e.g. dotCMS or Tomcat user).
Use CWE-89, Dotcms vendor hub and Dotcms product page to widen CVE-2025-11165 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-26352, CVE-2022-45782 and CVE-2022-45783 for nearby disclosures in the same product family.