{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T02:11:18.017","vulnerabilities":[{"cve":{"id":"CVE-2025-30209","sourceIdentifier":"security-advisories@github.com","published":"2025-03-31T16:15:25.620","lastModified":"2025-08-21T21:59:27.717","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10."},{"lang":"es","value":"Tuleap es una suite de código abierto que mejora la gestión del desarrollo de software y la colaboración. Un atacante puede acceder al contenido o la información de las notas de la versión a través de los endpoints REST de FRS a los que no debería tener acceso. Esta vulnerabilidad está corregida en Tuleap Community Edition 16.5.99.1742812323 y Tuleap Enterprise Edition 16.5-6 y 16.4-10."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.4-10","matchCriteriaId":"535D4D22-BF61-4A99-8515-E95722AC7103"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"16.5.99.1742812323","matchCriteriaId":"867EB5A8-3A1E-4DA7-A21A-872997E02D33"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.5","versionEndExcluding":"16.5-6","matchCriteriaId":"DE29611D-B4AB-456E-9DBE-F17652DECEC6"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=34af2d5d10b0349967129f53427f495815e5bbcc","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://tuleap.net/plugins/tracker/?aid=42251","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}