{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T14:44:17.551","vulnerabilities":[{"cve":{"id":"CVE-2025-27156","sourceIdentifier":"security-advisories@github.com","published":"2025-03-04T17:15:18.997","lastModified":"2025-08-22T15:57:26.430","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. The mass emailing features do not sanitize the content of the HTML emails. A malicious user could use this issue to facilitate a phishing attempt or to indirectly exploit issues in the recipients mail clients. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740567344 and Tuleap Enterprise Edition 16.4-6 and 16.3-11."},{"lang":"es","value":"Tuleap es una suite de código abierto para mejorar la gestión de los desarrollos de software y la colaboración. Las funciones de envío masivo de correos electrónicos no depuran el contenido de los correos electrónicos HTML. Un usuario malintencionado podría utilizar este problema para facilitar un intento de phishing o para explotar indirectamente problemas en los clientes de correo de los destinatarios. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740567344 y Tuleap Enterprise Edition 16.4-6 y 16.3-11."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N","baseScore":4.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.3-11","matchCriteriaId":"44FFF09C-980B-4D7E-AF34-BBAECB1B179D"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"16.4.99.1740567344","matchCriteriaId":"0D124015-9B32-4210-B68D-9F8EC70C5E7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.4","versionEndExcluding":"16.4-6","matchCriteriaId":"54A72640-277F-4E54-A2F4-8948FF0F16E2"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/a0bc657297b405debce1f5bcbbb30c733f3f09bd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-x2v2-xr59-c9cf","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://tuleap.net/plugins/tracker/?aid=42177","source":"security-advisories@github.com","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}