Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
References
| Link | Resource |
|---|---|
| https://github.com/Enalean/tuleap/commit/1734a7bb2964042310ddc3f6dd7b4c82eee27526 | Patch |
| https://github.com/Enalean/tuleap/security/advisories/GHSA-9h47-jg7r-ww7x | Vendor Advisory |
| https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=1734a7bb2964042310ddc3f6dd7b4c82eee27526 | Patch Broken Link |
| https://tuleap.net/plugins/tracker/?aid=45592 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-08 23:15
Updated : 2025-12-10 21:03
NVD link : CVE-2025-64499
Mitre link : CVE-2025-64499
CVE.ORG link : CVE-2025-64499
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
