Skip to content

File tree

10 files changed

+344
-71
lines changed

10 files changed

+344
-71
lines changed

advisories/unreviewed/2025/10/GHSA-273c-4g26-4jpm/GHSA-273c-4g26-4jpm.json renamed to advisories/github-reviewed/2025/10/GHSA-273c-4g26-4jpm/GHSA-273c-4g26-4jpm.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,57 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-273c-4g26-4jpm",
4-
"modified": "2025-10-30T15:32:36Z",
4+
"modified": "2025-10-30T17:08:56Z",
55
"published": "2025-10-30T12:31:11Z",
66
"aliases": [
77
"CVE-2025-62402"
88
],
9+
"summary": "Apache Airflow `/api/v2/dagReports` executes DAG Python in API",
910
"details": "API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "apache-airflow"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "3.0.0"
29+
},
30+
{
31+
"fixed": "3.1.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62402"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/apache/airflow/pull/56609"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/apache/airflow/commit/828aaa0b1d95caf90612a648867c17aec7e87874"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/apache/airflow"
54+
},
2255
{
2356
"type": "WEB",
2457
"url": "https://lists.apache.org/thread/vbzxnxn031wb998hsd7vqnvh4z8nx6rs"
@@ -33,8 +66,8 @@
3366
"CWE-250"
3467
],
3568
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2025-10-30T17:08:56Z",
3871
"nvd_published_at": "2025-10-30T10:15:35Z"
3972
}
4073
}
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8hw3-ghwv-crfh",
4+
"modified": "2025-10-30T17:07:13Z",
5+
"published": "2025-10-30T00:31:04Z",
6+
"aliases": [
7+
"CVE-2025-62257"
8+
],
9+
"summary": "Liferay Portal vulnerable to password enumeration",
10+
"details": "Password enumeration vulnerability in Liferay Portal 7.4.0 through 7.4.3.119, and older unsupported versions, and Liferay DXP 2024.Q1.1 through 2024.Q1.5, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions allows remote attackers to determine a user’s password even if account lockout is enabled via brute force attack.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "com.liferay.portal:release.portal.bom"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "7.4.0-ga1"
29+
},
30+
{
31+
"fixed": "7.4.3.120"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62257"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/liferay/liferay-portal/commit/45cffd5030ab78e8b005d9cfd6284311da978c68"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/liferay/liferay-portal/commit/924a0a47007665693fe2d29623cb48a426a80266"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/liferay/liferay-portal/commit/d21627ac07561c5063f611be631e63ff502ec8e7"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/liferay/liferay-portal"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://liferay.atlassian.net/browse/LPE-17692"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62257"
66+
}
67+
],
68+
"database_specific": {
69+
"cwe_ids": [
70+
"CWE-307"
71+
],
72+
"severity": "MODERATE",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2025-10-30T17:07:12Z",
75+
"nvd_published_at": "2025-10-30T00:15:34Z"
76+
}
77+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cf57-c578-7jvv",
4+
"modified": "2025-10-30T17:08:12Z",
5+
"published": "2025-10-30T17:08:12Z",
6+
"aliases": [],
7+
"summary": "Anubis vulnerable to possible XSS via redir parameter when using subrequest auth mode",
8+
"details": "### Summary\n\nWhen using subrequest authentication, Anubis did not perform validation of the redirect URL and redirects user to any URL scheme. While most modern browsers do not allow a redirect to `javascript:` URLs, it could still trigger dangerous behavior in some cases.\n\n`GET https://example.com/.within.website/?redir=javascript:alert()` responds with `Location: javascript:alert()`.\n\n### Impact\n\nAnybody with a subrequest authentication seems affected. Using `javascript:` URLs will probably be blocked by most modern browsers, but using custom protocols for third-party applications might still trigger dangerous operations.\n\n### Note\n\nThis was originally reported by @mbiesiad against Weblate.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/TecharoHQ/anubis"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "1.23.0"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/TecharoHQ/anubis/security/advisories/GHSA-cf57-c578-7jvv"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/TecharoHQ/anubis/commit/7ed1753fcced351c81961bf520a7bfb2caac6e88"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/TecharoHQ/anubis"
48+
}
49+
],
50+
"database_specific": {
51+
"cwe_ids": [
52+
"CWE-601",
53+
"CWE-79"
54+
],
55+
"severity": "LOW",
56+
"github_reviewed": true,
57+
"github_reviewed_at": "2025-10-30T17:08:12Z",
58+
"nvd_published_at": null
59+
}
60+
}

advisories/unreviewed/2025/10/GHSA-gp5f-cx7h-8q6f/GHSA-gp5f-cx7h-8q6f.json renamed to advisories/github-reviewed/2025/10/GHSA-gp5f-cx7h-8q6f/GHSA-gp5f-cx7h-8q6f.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,52 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gp5f-cx7h-8q6f",
4-
"modified": "2025-10-30T15:32:36Z",
4+
"modified": "2025-10-30T17:09:32Z",
55
"published": "2025-10-30T12:31:11Z",
66
"aliases": [
77
"CVE-2025-62503"
88
],
9+
"summary": "Apache Airflow's create action can upsert existing Pools/Connections/Variables",
910
"details": "User with CREATE and no UPDATE privilege for Pools, Connections, Variables could update existing records via bulk create API with overwrite action.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "apache-airflow"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "3.0.0"
29+
},
30+
{
31+
"fixed": "3.1.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62503"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/apache/airflow"
46+
},
2247
{
2348
"type": "WEB",
24-
"url": "https://lists.apache.org/thread/3v58249qscyn1hg240gh8hqg9pb4okcr"
49+
"url": "https://lists.apache.org/thread/ov923dyccwbv01v9mhcv7t7ykzobycfo"
2550
},
2651
{
2752
"type": "WEB",
@@ -33,8 +58,8 @@
3358
"CWE-250"
3459
],
3560
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-10-30T17:09:32Z",
3863
"nvd_published_at": "2025-10-30T10:15:35Z"
3964
}
4065
}

advisories/unreviewed/2025/10/GHSA-h72q-cq3w-h3wc/GHSA-h72q-cq3w-h3wc.json renamed to advisories/github-reviewed/2025/10/GHSA-h72q-cq3w-h3wc/GHSA-h72q-cq3w-h3wc.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h72q-cq3w-h3wc",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:06:12Z",
55
"published": "2025-10-30T00:31:04Z",
66
"aliases": [
77
"CVE-2025-12083"
88
],
9-
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal CivicTheme Design System allows Cross-Site Scripting (XSS).This issue affects CivicTheme Design System: from 0.0.0 before 1.12.0.",
9+
"summary": "Drupal CivicTheme Design System allows Cross-Site Scripting (XSS)",
10+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal CivicTheme Design System allows Cross-Site Scripting (XSS). This issue affects CivicTheme Design System: from 0.0.0 before 1.12.0.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/civictheme"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.12.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-79"
3051
],
3152
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:06:12Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}

advisories/unreviewed/2025/10/GHSA-jqmq-fpwv-p925/GHSA-jqmq-fpwv-p925.json renamed to advisories/github-reviewed/2025/10/GHSA-jqmq-fpwv-p925/GHSA-jqmq-fpwv-p925.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jqmq-fpwv-p925",
4-
"modified": "2025-10-30T15:32:35Z",
4+
"modified": "2025-10-30T17:06:19Z",
55
"published": "2025-10-30T00:31:04Z",
66
"aliases": [
77
"CVE-2025-12466"
88
],
9-
"details": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Simple OAuth (OAuth2) & OpenID Connect allows Authentication Bypass.This issue affects Simple OAuth (OAuth2) & OpenID Connect: from 6.0.0 before 6.0.7.",
9+
"summary": "Drupal Simple OAuth (OAuth2) & OpenID Connect allows Authentication Bypass",
10+
"details": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Simple OAuth (OAuth2) & OpenID Connect allows Authentication Bypass. This issue affects Simple OAuth (OAuth2) & OpenID Connect: from 6.0.0 before 6.0.7.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "drupal/simple_oauth"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "6.0.0"
29+
},
30+
{
31+
"fixed": "6.0.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -29,8 +50,8 @@
2950
"CWE-288"
3051
],
3152
"severity": "HIGH",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-10-30T17:06:19Z",
3455
"nvd_published_at": "2025-10-30T00:15:34Z"
3556
}
3657
}

0 commit comments

Comments
 (0)