Skip to content

File tree

7 files changed

+35
-18
lines changed

7 files changed

+35
-18
lines changed

advisories/github-reviewed/2025/12/GHSA-428g-f7cq-pgp5/GHSA-428g-f7cq-pgp5.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-428g-f7cq-pgp5",
4-
"modified": "2025-12-22T20:20:07Z",
4+
"modified": "2025-12-23T16:01:21Z",
55
"published": "2025-12-22T20:20:07Z",
66
"aliases": [
77
"CVE-2025-68480"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/marshmallow-code/marshmallow/security/advisories/GHSA-428g-f7cq-pgp5"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68480"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/marshmallow-code/marshmallow/commit/d24a0c9df061c4daa92f71cf85aca25b83eee508"
@@ -75,6 +79,6 @@
7579
"severity": "MODERATE",
7680
"github_reviewed": true,
7781
"github_reviewed_at": "2025-12-22T20:20:07Z",
78-
"nvd_published_at": null
82+
"nvd_published_at": "2025-12-22T22:16:09Z"
7983
}
8084
}

advisories/github-reviewed/2025/12/GHSA-5xpq-2vmc-5cqp/GHSA-5xpq-2vmc-5cqp.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5xpq-2vmc-5cqp",
4-
"modified": "2025-12-18T01:05:39Z",
4+
"modified": "2025-12-23T16:02:16Z",
55
"published": "2025-12-10T21:31:32Z",
66
"aliases": [
77
"CVE-2025-34430"
88
],
99
"summary": "1Panel contains a cross-site request forgery (CSRF) vulnerability in the panel name management functionality",
1010
"details": "1Panel versions 1.10.33 through 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the panel name management functionality. The affected endpoint does not implement CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a panel-name change request; if a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows a remote attacker to change the victim’s panel name to an arbitrary value without consent.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
@@ -52,10 +56,6 @@
5256
"type": "WEB",
5357
"url": "https://github.com/1Panel-dev/1Panel/releases"
5458
},
55-
{
56-
"type": "ADVISORY",
57-
"url": "https://github.com/advisories/GHSA-5xpq-2vmc-5cqp"
58-
},
5959
{
6060
"type": "WEB",
6161
"url": "https://www.vulncheck.com/advisories/1panel-csrf-panel-name-modification"

advisories/github-reviewed/2025/12/GHSA-8ggh-xwr9-3373/GHSA-8ggh-xwr9-3373.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,8 @@
6767
],
6868
"database_specific": {
6969
"cwe_ids": [
70-
"CWE-200"
70+
"CWE-200",
71+
"CWE-532"
7172
],
7273
"severity": "MODERATE",
7374
"github_reviewed": true,

advisories/github-reviewed/2025/12/GHSA-c4p6-qg4m-9jmr/GHSA-c4p6-qg4m-9jmr.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c4p6-qg4m-9jmr",
4-
"modified": "2025-12-22T20:08:24Z",
4+
"modified": "2025-12-23T16:01:17Z",
55
"published": "2025-12-22T20:08:24Z",
66
"aliases": [
77
"CVE-2025-68476"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/kedacore/keda/security/advisories/GHSA-c4p6-qg4m-9jmr"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68476"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/kedacore/keda/commit/15c5677f65f809b9b6b59a52f4cf793db0a510fd"
@@ -76,6 +80,6 @@
7680
"severity": "HIGH",
7781
"github_reviewed": true,
7882
"github_reviewed_at": "2025-12-22T20:08:24Z",
79-
"nvd_published_at": null
83+
"nvd_published_at": "2025-12-22T22:16:09Z"
8084
}
8185
}

advisories/github-reviewed/2025/12/GHSA-rchf-xwx2-hm93/GHSA-rchf-xwx2-hm93.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rchf-xwx2-hm93",
4-
"modified": "2025-12-22T21:36:55Z",
4+
"modified": "2025-12-23T16:01:12Z",
55
"published": "2025-12-22T21:36:55Z",
66
"aliases": [
77
"CVE-2025-68475"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68475"
103+
},
100104
{
101105
"type": "WEB",
102106
"url": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779"
@@ -133,6 +137,6 @@
133137
"severity": "HIGH",
134138
"github_reviewed": true,
135139
"github_reviewed_at": "2025-12-22T21:36:55Z",
136-
"nvd_published_at": null
140+
"nvd_published_at": "2025-12-22T22:16:09Z"
137141
}
138142
}

advisories/github-reviewed/2025/12/GHSA-rpr2-4hqj-hc4q/GHSA-rpr2-4hqj-hc4q.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rpr2-4hqj-hc4q",
4-
"modified": "2025-12-18T01:03:07Z",
4+
"modified": "2025-12-23T16:01:56Z",
55
"published": "2025-12-10T18:30:25Z",
66
"aliases": [
77
"CVE-2025-34410"
88
],
99
"summary": "1Panel contains a cross-site request forgery (CSRF) vulnerability in the Change Username functionality",
1010
"details": "1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the Change Username functionality available from the settings panel (/settings/panel). The endpoint does not implement CSRF protections such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a username-change request; when a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the victim’s 1Panel username without consent. After the change, the victim is logged out and unable to log in with the previous username, resulting in account lockout and denial of service.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N"
@@ -52,10 +56,6 @@
5256
"type": "WEB",
5357
"url": "https://github.com/1Panel-dev/1Panel/releases"
5458
},
55-
{
56-
"type": "ADVISORY",
57-
"url": "https://github.com/advisories/GHSA-rpr2-4hqj-hc4q"
58-
},
5959
{
6060
"type": "WEB",
6161
"url": "https://www.vulncheck.com/advisories/1panel-csrf-in-change-username-functionality-allows-account-lockout"

advisories/github-reviewed/2025/12/GHSA-wrvc-x3wf-j5f5/GHSA-wrvc-x3wf-j5f5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wrvc-x3wf-j5f5",
4-
"modified": "2025-12-10T21:55:56Z",
4+
"modified": "2025-12-23T16:02:04Z",
55
"published": "2025-12-10T21:31:32Z",
66
"aliases": [
77
"CVE-2025-34429"
88
],
99
"summary": "1Panel contains a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality",
1010
"details": "1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N"

0 commit comments

Comments
 (0)