Skip to content

Commit 56b24ae

Browse files
1 parent 87b110a commit 56b24ae

File tree

2 files changed

+119
-7
lines changed

2 files changed

+119
-7
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gr35-vpx2-qxhc",
4+
"modified": "2025-11-05T18:45:59Z",
5+
"published": "2025-11-05T18:45:59Z",
6+
"aliases": [
7+
"CVE-2025-64326"
8+
],
9+
"summary": "Weblate leaks the IP of project member inviting user to be reviewer in Audit log",
10+
"details": "### Summary\nWeblate leaks the IP address of the project member inviting the user to the project in the audit log.\n\n### Details\nThe audit log included IP addresses from admin-triggered actions, and those could be viewed by invited users.\n\n### Impact\n\nThe inviting user's (admin's) IP address could be leaked to invited users.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "weblate"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "5.14.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-gr35-vpx2-qxhc"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/WeblateOrg/weblate/pull/16781"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/WeblateOrg/weblate/commit/b847e9756a0a6f7659ef20fa9f34846ca862c574"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/WeblateOrg/weblate"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-212"
59+
],
60+
"severity": "LOW",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-11-05T18:45:59Z",
63+
"nvd_published_at": null
64+
}
65+
}

advisories/unreviewed/2025/11/GHSA-jc85-fpwf-qm7x/GHSA-jc85-fpwf-qm7x.json renamed to advisories/github-reviewed/2025/11/GHSA-jc85-fpwf-qm7x/GHSA-jc85-fpwf-qm7x.json

Lines changed: 54 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,59 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jc85-fpwf-qm7x",
4-
"modified": "2025-11-05T03:30:23Z",
4+
"modified": "2025-11-05T18:46:50Z",
55
"published": "2025-11-05T03:30:23Z",
66
"aliases": [
77
"CVE-2025-12735"
88
],
9+
"summary": "expr-eval does not restrict functions passed to the evaluate function",
910
"details": "The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution.",
10-
"severity": [],
11-
"affected": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "expr-eval"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.0.2"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "expr-eval-fork"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"last_affected": "2.0.2"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
1257
"references": [
1358
{
1459
"type": "ADVISORY",
@@ -36,10 +81,12 @@
3681
}
3782
],
3883
"database_specific": {
39-
"cwe_ids": [],
40-
"severity": null,
41-
"github_reviewed": false,
42-
"github_reviewed_at": null,
84+
"cwe_ids": [
85+
"CWE-94"
86+
],
87+
"severity": "HIGH",
88+
"github_reviewed": true,
89+
"github_reviewed_at": "2025-11-05T18:46:50Z",
4390
"nvd_published_at": "2025-11-05T01:15:33Z"
4491
}
4592
}

0 commit comments

Comments
 (0)