Skip to content

Commit 808ea8f

Browse files
1 parent f130455 commit 808ea8f

File tree

2 files changed

+65
-11
lines changed

2 files changed

+65
-11
lines changed

advisories/unreviewed/2025/06/GHSA-f823-phmg-x5fr/GHSA-f823-phmg-x5fr.json renamed to advisories/github-reviewed/2025/06/GHSA-f823-phmg-x5fr/GHSA-f823-phmg-x5fr.json

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f823-phmg-x5fr",
4-
"modified": "2025-06-29T09:30:23Z",
4+
"modified": "2025-11-03T20:14:59Z",
55
"published": "2025-06-29T09:30:23Z",
66
"aliases": [
77
"CVE-2025-6855"
88
],
9+
"summary": "Langchain-Chatchat vulnerable to path traversal",
910
"details": "A vulnerability, which was classified as critical, has been found in chatchat-space Langchain-Chatchat up to 0.3.1. This issue affects some unknown processing of the file /v1/file. The manipulation of the argument flag leads to path traversal. The exploit has been disclosed to the public and may be used.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "langchain-chatchat"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "0.3.1"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://github.com/chatchat-space/Langchain-Chatchat/issues/5354"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/chatchat-space/Langchain-Chatchat"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://vuldb.com/?ctiid.314327"
@@ -44,9 +69,9 @@
4469
"cwe_ids": [
4570
"CWE-22"
4671
],
47-
"severity": "MODERATE",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
72+
"severity": "LOW",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2025-11-03T20:14:58Z",
5075
"nvd_published_at": "2025-06-29T09:15:24Z"
5176
}
5277
}

advisories/unreviewed/2025/10/GHSA-q285-wfpg-93hr/GHSA-q285-wfpg-93hr.json renamed to advisories/github-reviewed/2025/10/GHSA-q285-wfpg-93hr/GHSA-q285-wfpg-93hr.json

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q285-wfpg-93hr",
4-
"modified": "2025-10-31T21:31:02Z",
4+
"modified": "2025-11-03T20:16:18Z",
55
"published": "2025-10-31T21:31:02Z",
66
"aliases": [
77
"CVE-2025-62267"
88
],
9+
"summary": "Liferay Portal and DXP affected by multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page",
910
"details": "Multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page in Liferay Portal 7.4.3.35 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 35 through update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user’s (1) First Name, (2) Middle Name, or (3) Last Name text field.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "com.liferay:com.liferay.dynamic.data.mapping.item.selector.web"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.0.9"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62267"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/liferay/liferay-portal"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://liferay.atlassian.net/browse/LPE-17900"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62267"
@@ -29,8 +58,8 @@
2958
"CWE-79"
3059
],
3160
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-11-03T20:16:18Z",
3463
"nvd_published_at": "2025-10-31T19:15:50Z"
3564
}
3665
}

0 commit comments

Comments
 (0)