{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:51:33.113","vulnerabilities":[{"cve":{"id":"CVE-2025-27401","sourceIdentifier":"security-advisories@github.com","published":"2025-03-04T17:15:19.547","lastModified":"2025-08-22T16:00:59.597","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11."},{"lang":"es","value":"Tuleap es una suite de código abierto para mejorar la gestión de los desarrollos de software y la colaboración. En un uso estándar de Tuleap, el problema tiene un impacto limitado, en su mayoría dejará datos pendientes. Sin embargo, un usuario malintencionado podría crear y eliminar informes varias veces para recorrer todos los filtros de todos los informes de la instancia y eliminarlos. El usuario malintencionado solo necesita tener acceso a un rastreador. Esto provocaría la pérdida de todos los filtros de criterios, lo que obligaría a los usuarios y administradores de rastreadores a volver a crearlos. Esta vulnerabilidad se solucionó en Tuleap Community Edition 16.4.99.1740498975 y Tuleap Enterprise Edition 16.4-6 y 16.3-11."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-440"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.3-11","matchCriteriaId":"44FFF09C-980B-4D7E-AF34-BBAECB1B179D"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"16.4.99.1740498975","matchCriteriaId":"5609916B-3E6B-4009-8837-701EF159FF6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.4","versionEndExcluding":"16.4-6","matchCriteriaId":"54A72640-277F-4E54-A2F4-8948FF0F16E2"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://tuleap.net/plugins/tracker/?aid=41850","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]}]}}]}