{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T17:08:41.361","vulnerabilities":[{"cve":{"id":"CVE-2025-2402","sourceIdentifier":"security@knime.com","published":"2025-03-31T07:15:18.280","lastModified":"2025-10-08T17:16:33.893","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A hard-coded, non-random password for the object store (minio) of KNIME Business Hub in all versions except the ones listed below allows an unauthenticated remote attacker in possession of the password to read and manipulate swapped jobs or read and manipulate in- and output data of active jobs. It is also possible to cause a denial-of-service of most functionality of KNIME Business Hub by writing large amounts of data to the object store directly. \n\n\n\nThere are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub: \n\n\n\n  *  1.13.2 or later \n\n\n\n\n\n\n  *  1.12.3 or later \n\n\n\n\n\n\n  *  1.11.3 or later \n\n\n\n\n\n\n  *  1.10.3 or later"},{"lang":"es","value":"Una contraseña no aleatoria y fijada en el código para el almacén de objetos (minio) de KNIME Business Hub, en todas las versiones excepto las que se indican a continuación, permite que un atacante remoto no autenticado que la posea lea y manipule trabajos intercambiados o lea y manipule datos de entrada y salida de trabajos activos. También es posible provocar una denegación de servicio en la mayoría de las funciones de KNIME Business Hub al escribir grandes cantidades de datos directamente en el almacén de objetos. No existen workarounds viables, por lo que recomendamos encarecidamente actualizar a una de las siguientes versiones de KNIME Business Hub: * 1.13.2 o posterior * 1.12.3 o posterior * 1.11.3 o posterior * 1.10.3 o posterior"}],"metrics":{"cvssMetricV40":[{"source":"security@knime.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7}]},"weaknesses":[{"source":"security@knime.com","type":"Secondary","description":[{"lang":"en","value":"CWE-259"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10.3","matchCriteriaId":"81D9C268-C37C-4D91-A5B5-1E98DCA04B79"},{"vulnerable":true,"criteria":"cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*","versionStartIncluding":"1.11.0","versionEndExcluding":"1.11.3","matchCriteriaId":"7A6E2E3C-C4A6-4AEB-B9EE-7DC506CA81DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*","versionStartIncluding":"1.12.0","versionEndExcluding":"1.12.3","matchCriteriaId":"CC9369E4-3314-4D76-B7FF-F53A098A7669"},{"vulnerable":true,"criteria":"cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*","versionStartIncluding":"1.13.0","versionEndExcluding":"1.13.2","matchCriteriaId":"190F38D7-CE39-42A9-848B-910E39C627A6"}]}]}],"references":[{"url":"https://www.knime.com/security/advisories#CVE-2025-2402","source":"security@knime.com","tags":["Vendor Advisory"]},{"url":"https://github.com/advisories/GHSA-v5p7-3387-gpmg","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]}]}}]}