{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T00:24:33.141","vulnerabilities":[{"cve":{"id":"CVE-2025-22129","sourceIdentifier":"security-advisories@github.com","published":"2025-02-03T22:15:28.040","lastModified":"2025-08-22T16:19:54.547","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Tuleap es una suite de código abierto que mejora la gestión de los desarrollos de software y la colaboración. En las versiones afectadas, un usuario no autorizado podría obtener acceso a información restringida. Este problema se ha solucionado en Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5 y Tuleap Enterprise Edition 16.3-2. Se recomienda a los usuarios que actualicen la versión. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-280"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.2-5","matchCriteriaId":"41FE2568-290E-4F8B-A68A-9DB729C3AEEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"16.3.99.1736242932","matchCriteriaId":"DFA88343-F810-4A5C-8E92-6A254B7B88A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.3","versionEndExcluding":"16.3-2","matchCriteriaId":"9D9BF98E-1188-4BB7-865E-0836EBD2E60C"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-f34g-wc2m-mf76","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=3edf8158ba40be66f0b661888b8b2805784795d1","source":"security-advisories@github.com","tags":["Permissions Required"]},{"url":"https://tuleap.net/plugins/tracker/?aid=41434","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://tuleap.net/plugins/tracker/?aid=41434","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]}]}}]}