Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-24016 (GCVE-0-2025-24016)
Vulnerability from cvelistv5 – Published: 2025-02-10 19:08 – Updated: 2026-02-26 19:09- CWE-502 - Deserialization of Untrusted Data
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-502 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Wazuh Server |
| Due Date | 2025-07-01 |
| Date Added | 2025-06-10 |
| Vendorproject | Wazuh |
| Vulnerabilityname | Wazuh Server Deserialization of Untrusted Data Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-24016",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T03:56:07.089496Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-06-10",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:19.971Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-10T00:00:00.000Z",
"value": "CVE-2025-24016 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "wazuh",
"vendor": "wazuh",
"versions": [
{
"status": "affected",
"version": "\u003e= 4.4.0, \u003c 4.9.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502: Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-10T19:08:09.058Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh"
}
],
"source": {
"advisory": "GHSA-hcrc-79hj-m3qh",
"discovery": "UNKNOWN"
},
"title": "Remote code execution in Wazuh server"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-24016",
"datePublished": "2025-02-10T19:08:09.058Z",
"dateReserved": "2025-01-16T17:31:06.458Z",
"dateUpdated": "2026-02-26T19:09:19.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2025-24016",
"cwes": "[\"CWE-502\"]",
"dateAdded": "2025-06-10",
"dueDate": "2025-07-01",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://wazuh.com/blog/addressing-the-cve-2025-24016-vulnerability/ ; https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh ; https://nvd.nist.gov/vuln/detail/CVE-2025-24016",
"product": "Wazuh Server",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Wazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.",
"vendorProject": "Wazuh",
"vulnerabilityName": "Wazuh Server Deserialization of Untrusted Data Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-24016\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-02-10T20:15:42.540\",\"lastModified\":\"2025-10-24T13:59:44.790\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.\"},{\"lang\":\"es\",\"value\":\"Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta ante amenazas. A partir de la versi\u00f3n 4.4.0 y antes de la versi\u00f3n 4.9.1, una vulnerabilidad de deserializaci\u00f3n insegura permite la ejecuci\u00f3n remota de c\u00f3digo en servidores Wazuh. Los par\u00e1metros de DistributedAPI se serializan como JSON y se deserializan utilizando `as_wazuh_object` (en `framework/wazuh/core/cluster/common.py`). Si un atacante logra inyectar un diccionario no depurado en una solicitud/respuesta DAPI, puede falsificar una excepci\u00f3n no controlada (`__unhandled_exc__`) para evaluar c\u00f3digo Python arbitrario. La vulnerabilidad puede ser activada por cualquier persona con acceso a la API (panel de control comprometido o servidores Wazuh en el cl\u00faster) o, en ciertas configuraciones, incluso por un agente comprometido. La versi\u00f3n 4.9.1 contiene una correcci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2025-06-10\",\"cisaActionDue\":\"2025-07-01\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Wazuh Server Deserialization of Untrusted Data Vulnerability\",\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0\",\"versionEndExcluding\":\"4.9.1\",\"matchCriteriaId\":\"EB8004AB-265E-4432-AC10-8361DCFC1F56\"}]}]}],\"references\":[{\"url\":\"https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24016\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-20T03:56:07.089496Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-06-10\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-10T00:00:00.000Z\", \"value\": \"CVE-2025-24016 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-12T15:49:19.443Z\"}}], \"cna\": {\"title\": \"Remote code execution in Wazuh server\", \"source\": {\"advisory\": \"GHSA-hcrc-79hj-m3qh\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"wazuh\", \"product\": \"wazuh\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 4.4.0, \u003c 4.9.1\"}]}], \"references\": [{\"url\": \"https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh\", \"name\": \"https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-502\", \"description\": \"CWE-502: Deserialization of Untrusted Data\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-02-10T19:08:09.058Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-24016\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T19:09:19.971Z\", \"dateReserved\": \"2025-01-16T17:31:06.458Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-02-10T19:08:09.058Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-24016
Vulnerability from fkie_nvd - Published: 2025-02-10 20:15 - Updated: 2025-10-24 13:59{
"cisaActionDue": "2025-07-01",
"cisaExploitAdd": "2025-06-10",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Wazuh Server Deserialization of Untrusted Data Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8004AB-265E-4432-AC10-8361DCFC1F56",
"versionEndExcluding": "4.9.1",
"versionStartIncluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix."
},
{
"lang": "es",
"value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta ante amenazas. A partir de la versi\u00f3n 4.4.0 y antes de la versi\u00f3n 4.9.1, una vulnerabilidad de deserializaci\u00f3n insegura permite la ejecuci\u00f3n remota de c\u00f3digo en servidores Wazuh. Los par\u00e1metros de DistributedAPI se serializan como JSON y se deserializan utilizando `as_wazuh_object` (en `framework/wazuh/core/cluster/common.py`). Si un atacante logra inyectar un diccionario no depurado en una solicitud/respuesta DAPI, puede falsificar una excepci\u00f3n no controlada (`__unhandled_exc__`) para evaluar c\u00f3digo Python arbitrario. La vulnerabilidad puede ser activada por cualquier persona con acceso a la API (panel de control comprometido o servidores Wazuh en el cl\u00faster) o, en ciertas configuraciones, incluso por un agente comprometido. La versi\u00f3n 4.9.1 contiene una correcci\u00f3n."
}
],
"id": "CVE-2025-24016",
"lastModified": "2025-10-24T13:59:44.790",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-02-10T20:15:42.540",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
BDU:2025-01366
Vulnerability from fstec - Published: 10.02.2025{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:P/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Wazuh, Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 4.9.1 (Wazuh)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u00ab\u0431\u0435\u043b\u043e\u0433\u043e\u00bb \u0441\u043f\u0438\u0441\u043a\u0430 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a API \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 SIEM-\u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 4.9.1 \u0438 \u0432\u044b\u0448\u0435\nhttps://github.com/wazuh/wazuh/releases",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.02.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.02.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-01366",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-24016",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Wazuh",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u00abas_wazuh_object\u00bb \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 Wazuh, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-502)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u00abas_wazuh_object\u00bb \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 Wazuh \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 DistributedAPI. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/wazuh/wazuh/releases\nhttps://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh\nhttps://www.securitycode.ru/company/blog/daydzhest-laboratorii-analiza-setevykh-ugroz-kod-bezopasnosti-za-mart-2025/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-502",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,7)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,9)"
}
GHSA-HCRC-79HJ-M3QH
Vulnerability from github – Published: 2025-04-22 16:53 – Updated: 2025-10-22 19:27Summary
An unsafe deserialization vulnerability allows for remote code execution on Wazuh servers.
The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent.
Details
DistributedAPI parameters are a serialized as JSON and deserialized using as_wazuh_object (in framework/wazuh/core/cluster/common.py). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (__unhandled_exc__) to evaluate arbitrary python code.
Using the server API, it quite easy to trigger. For example, using the run_as endpoint (implemented by run_as_login in api/api/controllers/security_controller.py): the auth_context argument is completely controlled by the attacker, and is forwarded to the master server to handle. By sending a malicious run_as request to a worker server, it is possible to execute code on the master server.
It is also possible to exploit the bug as a compromised agent, in certain configurations.
A compromised agent can respond to a getconfig request with a malicious JSON object (containing a serialized unhandled exception). If the getconfig request was caused because of a server API request to /agents/{agent_id}/config/{component}/{configuration} (api.controllers.agent_controller.get_agent_config), and the agent is managed by a server other than the one that received the server API request, the unsafe deserialization will occur on the server that received the original server API request.
user server A server B agent
| | | |
| -get-config-> | | |
| | --get-config-dapi-> | |
| | | --getconf-> |
| | | <-payload-- |
| X <-----payload------ | |
| | | |
It is likely that there are more ways to reach the unsafe deserialization function (as_wazuh_object), some of them might even be accessible from different contexts (without credentials, or initiated by a compromised agent). I suggest fixing the root cause instead of attempting to sanitize inputs that reach it. Note that there are multiple other ways to execute arbitrary code in as_wazuh_object, easier by using a __callable__, or potentially abusing callable gadgets in exception, wresults or Wazuh.
PoC
To trigger using the server API (assuming default credentials):
curl -X POST -k -u "wazuh-wui:MyS3cr37P450r.*-" -H "Content-Type: application/json" --data '{"__unhandled_exc__":{"__class__": "exit", "__args__": []}}' https://<worker-server>:55000/security/user/authenticate/run_as
this will shut down the master server.
Impact
This is a remote code execution on Wazuh server, affecting the latest version (v4.9.0 at this time)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/wazuh/wazuh"
},
"ranges": [
{
"events": [
{
"introduced": "4.4.0"
},
{
"fixed": "4.9.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-24016"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-22T16:53:39Z",
"nvd_published_at": "2025-02-10T20:15:42Z",
"severity": "CRITICAL"
},
"details": "### Summary\nAn unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. \nThe vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent.\n\n### Details\nDistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. \n\nUsing the server API, it quite easy to trigger. For example, using the `run_as` endpoint (implemented by `run_as_login` in `api/api/controllers/security_controller.py`): the `auth_context` argument is completely controlled by the attacker, and is forwarded to the master server to handle. By sending a malicious `run_as` request to a worker server, it is possible to execute code on the master server.\n\nIt is also possible to exploit the bug as a compromised agent, in certain configurations. \nA compromised agent can respond to a `getconfig` request with a malicious JSON object (containing a serialized unhandled exception). If the `getconfig` request was caused because of a server API request to `/agents/{agent_id}/config/{component}/{configuration}` (`api.controllers.agent_controller.get_agent_config`), and the agent is managed by a server other than the one that received the server API request, the unsafe deserialization will occur on the server that received the original server API request.\n\n```\nuser server A server B agent\n | | | |\n | -get-config-\u003e | | |\n | | --get-config-dapi-\u003e | |\n | | | --getconf-\u003e |\n | | | \u003c-payload-- |\n | X \u003c-----payload------ | |\n | | | |\n```\n\nIt is likely that there are more ways to reach the unsafe deserialization function (`as_wazuh_object`), some of them might even be accessible from different contexts (without credentials, or initiated by a compromised agent). I suggest fixing the root cause instead of attempting to sanitize inputs that reach it. Note that there are multiple other ways to execute arbitrary code in `as_wazuh_object`, easier by using a `__callable__`, or potentially abusing callable gadgets in `exception`, `wresults` or `Wazuh`.\n\n### PoC\nTo trigger using the server API (assuming default credentials): \n```bash\ncurl -X POST -k -u \"wazuh-wui:MyS3cr37P450r.*-\" -H \"Content-Type: application/json\" --data \u0027{\"__unhandled_exc__\":{\"__class__\": \"exit\", \"__args__\": []}}\u0027 https://\u003cworker-server\u003e:55000/security/user/authenticate/run_as\n```\nthis will shut down the master server.\n\n### Impact\nThis is a remote code execution on Wazuh server, affecting the latest version (v4.9.0 at this time)",
"id": "GHSA-hcrc-79hj-m3qh",
"modified": "2025-10-22T19:27:44Z",
"published": "2025-04-22T16:53:39Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24016"
},
{
"type": "PACKAGE",
"url": "https://github.com/wazuh/wazuh"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24016"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H/E:H",
"type": "CVSS_V3"
}
],
"summary": "Wazuh server vulnerable to remote code execution"
}
OPENSUSE-SU-2025:14889-1
Vulnerability from csaf_opensuse - Published: 2025-03-13 00:00 - Updated: 2025-03-13 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20250312T181707-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250312T181707-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14889",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14889-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57604 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0426 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1243 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1412 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-20051 page",
"url": "https://www.suse.com/security/cve/CVE-2025-20051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22870 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22952 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-23387 page",
"url": "https://www.suse.com/security/cve/CVE-2025-23387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-23388 page",
"url": "https://www.suse.com/security/cve/CVE-2025-23388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-23389 page",
"url": "https://www.suse.com/security/cve/CVE-2025-23389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-24016 page",
"url": "https://www.suse.com/security/cve/CVE-2025-24016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-24526 page",
"url": "https://www.suse.com/security/cve/CVE-2025-24526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-24806 page",
"url": "https://www.suse.com/security/cve/CVE-2025-24806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-24976 page",
"url": "https://www.suse.com/security/cve/CVE-2025-24976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25279 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25279/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25294 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27090 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27100 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27112 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27155 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27414 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27421 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27507 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27509 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27509/"
}
],
"title": "govulncheck-vulndb-0.0.20250312T181707-1.1 on GA media",
"tracking": {
"current_release_date": "2025-03-13T00:00:00Z",
"generator": {
"date": "2025-03-13T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14889-1",
"initial_release_date": "2025-03-13T00:00:00Z",
"revision_history": [
{
"date": "2025-03-13T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20250312T181707-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57603"
}
],
"notes": [
{
"category": "general",
"text": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the lack of rate limiting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57603",
"url": "https://www.suse.com/security/cve/CVE-2024-57603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-57603"
},
{
"cve": "CVE-2024-57604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57604"
}
],
"notes": [
{
"category": "general",
"text": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the token component.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57604",
"url": "https://www.suse.com/security/cve/CVE-2024-57604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-57604"
},
{
"cve": "CVE-2025-0426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0426"
}
],
"notes": [
{
"category": "general",
"text": "A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node\u0027s disk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0426",
"url": "https://www.suse.com/security/cve/CVE-2025-0426"
},
{
"category": "external",
"summary": "SUSE Bug 1237189 for CVE-2025-0426",
"url": "https://bugzilla.suse.com/1237189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-0426"
},
{
"cve": "CVE-2025-1243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1243"
}
],
"notes": [
{
"category": "general",
"text": "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1243",
"url": "https://www.suse.com/security/cve/CVE-2025-1243"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-1243"
},
{
"cve": "CVE-2025-1293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1293"
}
],
"notes": [
{
"category": "general",
"text": "Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1293",
"url": "https://www.suse.com/security/cve/CVE-2025-1293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-1293"
},
{
"cve": "CVE-2025-1412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1412"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 9.11.x \u003c= 9.11.6, 10.4.x \u003c= 10.4.1 fail to invalidate all active sessions when converting a user to a bot, with allows the converted user to escalate their privileges depending on the permissions granted to the bot.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1412",
"url": "https://www.suse.com/security/cve/CVE-2025-1412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-1412"
},
{
"cve": "CVE-2025-20051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-20051"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.4.x \u003c= 10.4.1, 9.11.x \u003c= 9.11.7, 10.3.x \u003c= 10.3.2, 10.2.x \u003c= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-20051",
"url": "https://www.suse.com/security/cve/CVE-2025-20051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-20051"
},
{
"cve": "CVE-2025-22870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22870"
}
],
"notes": [
{
"category": "general",
"text": "Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to \"*.example.com\", a request to \"[::1%25.example.com]:80` will incorrectly match and not be proxied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22870",
"url": "https://www.suse.com/security/cve/CVE-2025-22870"
},
{
"category": "external",
"summary": "SUSE Bug 1238572 for CVE-2025-22870",
"url": "https://bugzilla.suse.com/1238572"
},
{
"category": "external",
"summary": "SUSE Bug 1238611 for CVE-2025-22870",
"url": "https://bugzilla.suse.com/1238611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22870"
},
{
"cve": "CVE-2025-22952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22952"
}
],
"notes": [
{
"category": "general",
"text": "elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22952",
"url": "https://www.suse.com/security/cve/CVE-2025-22952"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-22952"
},
{
"cve": "CVE-2025-23387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-23387"
}
],
"notes": [
{
"category": "general",
"text": "A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher allowed unauthenticated users to list all CLI authentication tokens and delete them before the CLI is able to get the token value.This issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-23387",
"url": "https://www.suse.com/security/cve/CVE-2025-23387"
},
{
"category": "external",
"summary": "SUSE Bug 1236656 for CVE-2025-23387",
"url": "https://bugzilla.suse.com/1236656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-23387"
},
{
"cve": "CVE-2025-23388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-23388"
}
],
"notes": [
{
"category": "general",
"text": "A Stack-based Buffer Overflow vulnerability in SUSE rancher allows for denial of service.This issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-23388",
"url": "https://www.suse.com/security/cve/CVE-2025-23388"
},
{
"category": "external",
"summary": "SUSE Bug 1236668 for CVE-2025-23388",
"url": "https://bugzilla.suse.com/1236668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-23388"
},
{
"cve": "CVE-2025-23389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-23389"
}
],
"notes": [
{
"category": "general",
"text": "A Improper Access Control vulnerability in SUSE rancher allows a local user to impersonate other identities through SAML Authentication on first login.\nThis issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-23389",
"url": "https://www.suse.com/security/cve/CVE-2025-23389"
},
{
"category": "external",
"summary": "SUSE Bug 1236780 for CVE-2025-23389",
"url": "https://bugzilla.suse.com/1236780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-23389"
},
{
"cve": "CVE-2025-24016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-24016"
}
],
"notes": [
{
"category": "general",
"text": "Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-24016",
"url": "https://www.suse.com/security/cve/CVE-2025-24016"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-24016"
},
{
"cve": "CVE-2025-24526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-24526"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.1.x \u003c= 10.1.3, 10.4.x \u003c= 10.4.1, 9.11.x \u003c= 9.11.7, 10.3.x \u003c= 10.3.2, 10.2.x \u003c= 10.2.2 fail to restrict channel export of archived channels when the \"Allow users to view archived channels\" is disabled which allows a user to export channel contents when they shouldn\u0027t have access to it",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-24526",
"url": "https://www.suse.com/security/cve/CVE-2025-24526"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-24526"
},
{
"cve": "CVE-2025-24806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-24806"
}
],
"notes": [
{
"category": "general",
"text": "Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It\u0027s important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it\u0027s effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-24806",
"url": "https://www.suse.com/security/cve/CVE-2025-24806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-24806"
},
{
"cve": "CVE-2025-24976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-24976"
}
],
"notes": [
{
"category": "general",
"text": "Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn\u0027t verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-24976",
"url": "https://www.suse.com/security/cve/CVE-2025-24976"
},
{
"category": "external",
"summary": "SUSE Bug 1237074 for CVE-2025-24976",
"url": "https://bugzilla.suse.com/1237074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-24976"
},
{
"cve": "CVE-2025-25196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25196"
}
],
"notes": [
{
"category": "general",
"text": "OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA \u003c v1.8.4 (Helm chart \u003c openfga-0.2.22, docker \u003c v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request\u0027s user field is a userset that has the same type as the type bound public access tuple\u0027s user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25196",
"url": "https://www.suse.com/security/cve/CVE-2025-25196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-25196"
},
{
"cve": "CVE-2025-25199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25199"
}
],
"notes": [
{
"category": "general",
"text": "go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don\u0027t release the key handle, producing a small memory leak every time. Commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contains a fix for the issue. The fix is included in versions 1.23.6-2 and 1.22.12-2 of the Microsoft build of go, as well as in the pseudoversion 0.0.0-20250211154640-f49c8e1379ea of the `github.com/microsoft/go-crypto-winnative` Go package.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25199",
"url": "https://www.suse.com/security/cve/CVE-2025-25199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-25199"
},
{
"cve": "CVE-2025-25204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25204"
}
],
"notes": [
{
"category": "general",
"text": "`gh` is GitHub\u0027s official command line tool. Starting in version 2.49.0 and prior to version 2.67.0, under certain conditions, a bug in GitHub\u0027s Artifact Attestation cli tool `gh attestation verify` causes it to return a zero exit status when no attestations are present. This behavior is incorrect: When no attestations are present, `gh attestation verify` should return a non-zero exit status code, thereby signaling verification failure. An attacker can abuse this flaw to, for example, deploy malicious artifacts in any system that uses `gh attestation verify`\u0027s exit codes to gatekeep deployments. Users are advised to update `gh` to patched version `v2.67.0` as soon as possible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25204",
"url": "https://www.suse.com/security/cve/CVE-2025-25204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-25204"
},
{
"cve": "CVE-2025-25279",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25279"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.4.x \u003c= 10.4.1, 9.11.x \u003c= 9.11.7, 10.3.x \u003c= 10.3.2, 10.2.x \u003c= 10.2.2 fail to properly validate board blocks when importing boards which allows an attacker could read any arbitrary file on the system via importing and exporting a specially crafted import archive in Boards.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25279",
"url": "https://www.suse.com/security/cve/CVE-2025-25279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-25279"
},
{
"cve": "CVE-2025-25294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25294"
}
],
"notes": [
{
"category": "general",
"text": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnerable to log injection attacks. If the attacker uses a specially crafted user-agent which performs json injection, then he could add and overwrite fields to the access log. This vulnerability is fixed in 1.3.1 and 1.2.7. One can overwrite the old text based default format with JSON formatter by modifying the \"EnvoyProxy.spec.telemetry.accessLog\" setting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25294",
"url": "https://www.suse.com/security/cve/CVE-2025-25294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-25294"
},
{
"cve": "CVE-2025-27088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27088"
}
],
"notes": [
{
"category": "general",
"text": "oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It\u0027s possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user\u0027s context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27088",
"url": "https://www.suse.com/security/cve/CVE-2025-27088"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-27088"
},
{
"cve": "CVE-2025-27090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27090"
}
],
"notes": [
{
"category": "general",
"text": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the sliver teamserver without verifying if the operator instructed the implant to do so. The only impact that has been shown is the exposure of the server\u0027s IP address to a third party. This issue has been addressed in version 1.5.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27090",
"url": "https://www.suse.com/security/cve/CVE-2025-27090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27090"
},
{
"cve": "CVE-2025-27100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27100"
}
],
"notes": [
{
"category": "general",
"text": "lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versions 1.49.1 and below are affected. Users are advised to upgrade. Users unable to upgrade should either set the environment variable `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` to `true` or configure the `disable_pre_signed_multipart` key to true in their config yaml.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27100",
"url": "https://www.suse.com/security/cve/CVE-2025-27100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27100"
},
{
"cve": "CVE-2025-27112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27112"
}
],
"notes": [
{
"category": "general",
"text": "Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a \"permission denied\" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27112",
"url": "https://www.suse.com/security/cve/CVE-2025-27112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27112"
},
{
"cve": "CVE-2025-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27144"
}
],
"notes": [
{
"category": "general",
"text": "Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27144",
"url": "https://www.suse.com/security/cve/CVE-2025-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1237608 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237608"
},
{
"category": "external",
"summary": "SUSE Bug 1237609 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-27144"
},
{
"cve": "CVE-2025-27155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27155"
}
],
"notes": [
{
"category": "general",
"text": "Pinecone is an experimental overlay routing protocol suite which is the foundation of the current P2P Matrix demos. The Pinecone Simulator (pineconesim) included in Pinecone up to commit ea4c337 is vulnerable to stored cross-site scripting. The payload storage is not permanent and will be wiped when restarting pineconesim.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27155",
"url": "https://www.suse.com/security/cve/CVE-2025-27155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27155"
},
{
"cve": "CVE-2025-27414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27414"
}
],
"notes": [
{
"category": "general",
"text": "MinIO is a high performance object storage. Starting in RELEASE.2024-06-06T09-36-42Z and prior to \nRELEASE.2025-02-28T09-55-16Z, a bug in evaluating the trust of the SSH key used in an SFTP connection to MinIO allows authentication bypass and unauthorized data access. On a MinIO server with SFTP access configured and using LDAP as an external identity provider, MinIO supports SSH key based authentication for SFTP connections when the user has the `sshPublicKey` attribute set in their LDAP server. The server trusts the client\u0027s key only when the public key is the same as the `sshPublicKey` attribute. Due to the bug, when the user has no `sshPublicKey` property in LDAP, the server ends up trusting the key allowing the client to perform any FTP operations allowed by the MinIO access policies associated with the LDAP user (or any of their groups). Three requirements must be met in order to exploit the vulnerability. First, the MinIO server must be configured to allow SFTP access and use LDAP as an external identity provider. Second, the attacker must have knowledge of an LDAP username that does not have the `sshPublicKey` property set. Third, such an LDAP username or one of their groups must also have some MinIO access policy configured. When this bug is successfully exploited, the attacker can perform any FTP operations (i.e. reading, writing, deleting and listing objects) allowed by the access policy associated with the LDAP user account (and their groups). Version 1.2.0 fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27414",
"url": "https://www.suse.com/security/cve/CVE-2025-27414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27414"
},
{
"cve": "CVE-2025-27421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27421"
}
],
"notes": [
{
"category": "general",
"text": "Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server\u0027s Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27421",
"url": "https://www.suse.com/security/cve/CVE-2025-27421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-27421"
},
{
"cve": "CVE-2025-27507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27507"
}
],
"notes": [
{
"category": "general",
"text": "The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL\u0027s Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27507",
"url": "https://www.suse.com/security/cve/CVE-2025-27507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-27507"
},
{
"cve": "CVE-2025-27509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27509"
}
],
"notes": [
{
"category": "general",
"text": "fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27509",
"url": "https://www.suse.com/security/cve/CVE-2025-27509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250312T181707-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-13T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-27509"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.