Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
References
| Link | Resource |
|---|---|
| https://github.com/Enalean/tuleap/commit/993316dd6a291bb3937cb7a4571eaab0e7d55370 | Patch |
| https://github.com/Enalean/tuleap/security/advisories/GHSA-vxfh-h8p6-p5rg | Vendor Advisory |
| https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=993316dd6a291bb3937cb7a4571eaab0e7d55370 | Patch Broken Link |
| https://tuleap.net/plugins/tracker/?aid=45593 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-08 23:15
Updated : 2025-12-10 21:04
NVD link : CVE-2025-64498
Mitre link : CVE-2025-64498
CVE.ORG link : CVE-2025-64498
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
