Skip to content

Commit 28d3db6

Browse files

File tree

5 files changed

+169
-20
lines changed

5 files changed

+169
-20
lines changed

advisories/unreviewed/2025/10/GHSA-27fv-rpgj-4c6m/GHSA-27fv-rpgj-4c6m.json renamed to advisories/github-reviewed/2025/10/GHSA-27fv-rpgj-4c6m/GHSA-27fv-rpgj-4c6m.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-27fv-rpgj-4c6m",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:05:23Z",
55
"published": "2025-10-30T00:31:03Z",
66
"aliases": [
77
"CVE-2025-10930"
88
],
9-
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.",
9+
"summary": "Drupal Currency allows Cross Site Request Forgery",
10+
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery. This issue affects Currency: from 0.0.0 before 3.5.0.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/currency"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.5.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-352"
3051
],
3152
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:05:23Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}

advisories/unreviewed/2025/10/GHSA-27mc-9399-r9mx/GHSA-27mc-9399-r9mx.json renamed to advisories/github-reviewed/2025/10/GHSA-27mc-9399-r9mx/GHSA-27mc-9399-r9mx.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-27mc-9399-r9mx",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:05:06Z",
55
"published": "2025-10-30T00:31:03Z",
66
"aliases": [
77
"CVE-2025-10928"
88
],
9-
"details": "Improper Restriction of Excessive Authentication Attempts vulnerability in Drupal Access code allows Brute Force.This issue affects Access code: from 0.0.0 before 2.0.5.",
9+
"summary": "Drupal Access code allows Brute Force Attempts",
10+
"details": "Improper Restriction of Excessive Authentication Attempts vulnerability in Drupal Access code allows Brute Force. This issue affects Access code: from 0.0.0 before 2.0.5.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/access_code"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.0.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-307"
3051
],
3152
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:05:05Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}

advisories/unreviewed/2025/10/GHSA-fg8x-q69g-4qp3/GHSA-fg8x-q69g-4qp3.json renamed to advisories/github-reviewed/2025/10/GHSA-fg8x-q69g-4qp3/GHSA-fg8x-q69g-4qp3.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fg8x-q69g-4qp3",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:05:15Z",
55
"published": "2025-10-30T00:31:03Z",
66
"aliases": [
77
"CVE-2025-10929"
88
],
9-
"details": "Improper Validation of Consistency within Input vulnerability in Drupal Reverse Proxy Header allows Manipulating User-Controlled Variables.This issue affects Reverse Proxy Header: from 0.0.0 before 1.1.2.",
9+
"summary": "Drupal Reverse Proxy Header allows Manipulating User-Controlled Variables",
10+
"details": "Improper Validation of Consistency within Input vulnerability in Drupal Reverse Proxy Header allows Manipulating User-Controlled Variables. This issue affects Reverse Proxy Header: from 0.0.0 before 1.1.2.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/reverse_proxy_header"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.1.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-1288"
3051
],
3152
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:05:15Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}

advisories/unreviewed/2025/10/GHSA-jxp8-4jw5-5xjc/GHSA-jxp8-4jw5-5xjc.json renamed to advisories/github-reviewed/2025/10/GHSA-jxp8-4jw5-5xjc/GHSA-jxp8-4jw5-5xjc.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jxp8-4jw5-5xjc",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:05:32Z",
55
"published": "2025-10-30T00:31:03Z",
66
"aliases": [
77
"CVE-2025-10931"
88
],
9-
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Umami Analytics allows Cross-Site Scripting (XSS).This issue affects Umami Analytics: from 0.0.0 before 1.0.1.",
9+
"summary": "Drupal Umami Analytics allows Cross-Site Scripting (XSS)",
10+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Umami Analytics allows Cross-Site Scripting (XSS). This issue affects Umami Analytics: from 0.0.0 before 1.0.1.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/umami_analytics"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.0.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-79"
3051
],
3152
"severity": "LOW",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:05:32Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xgp7-7qjq-vg47",
4+
"modified": "2025-10-30T17:04:26Z",
5+
"published": "2025-10-30T17:04:26Z",
6+
"aliases": [
7+
"CVE-2025-62726"
8+
],
9+
"summary": "n8n Vulnerable to Remote Code Execution via Git Node Pre-Commit Hook",
10+
"details": "### Impact\nA remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n. When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook’s execution.\n\nThis allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows.\n\nAll users with workflows that utilize the Git Node to clone untrusted repositories are affected.\n\n### Patches\nThe vulnerability was addressed in v1.113.0 (n8n-io/n8n#19559), which introduces a new environment variable: `N8N_GIT_NODE_DISABLE_BARE_REPOS`. For self-hosted deployments, it is strongly recommended to set this variable to `true` to mitigate the risk of executing malicious Git hooks.\n\n### Workarounds\nTo reduce risk prior to upgrading:\n\n- Avoid cloning or interacting with untrusted repositories using the Git Node.\n- Disable or restrict the use of the Git Node in workflows where repository content cannot be fully trusted.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "n8n"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.113.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-xgp7-7qjq-vg47"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/n8n-io/n8n/pull/19559"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/n8n-io/n8n/commit/5bf3db5ba84d3195bbe11bbd3c62f7086e090997"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/n8n-io/n8n"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-829"
59+
],
60+
"severity": "HIGH",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-10-30T17:04:26Z",
63+
"nvd_published_at": null
64+
}
65+
}

0 commit comments

Comments
 (0)