{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11060","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-09-26T11:46:23.698Z","datePublished":"2025-09-26T12:01:22.738Z","dateUpdated":"2025-11-07T19:42:32.972Z"},"containers":{"cna":{"title":"Surrealdb: surrealdb is vulnerable to unauthorized data exposure via live query subscriptions","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records."}],"affected":[{"versions":[{"status":"affected","version":"0","lessThan":"2.1.9","versionType":"semver"},{"status":"affected","version":"2.2.0","lessThan":"2.2.8","versionType":"semver"},{"status":"affected","version":"2.3.0","lessThan":"2.3.8","versionType":"semver"},{"status":"affected","version":"3.3.0","lessThan":"3.3.0-alpha.7","versionType":"semver"}],"packageName":"surrealdb","collectionURL":"https://github.com/surrealdb/surrealdb/","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-cni-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-must-gather-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-pilot-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-proxyv2-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-rhel9-operator","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh/istio-sail-operator-bundle","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]},{"vendor":"Red Hat","product":"OpenShift Service Mesh 3","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openshift-service-mesh-tech-preview/istio-ztunnel-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:service_mesh:3"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2025-11060","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394708","name":"RHBZ#2394708","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/surrealdb/surrealdb"},{"url":"https://github.com/surrealdb/surrealdb/commit/d81169a06b89f0c588134ddf2d62eeb8d5e8fd0c"},{"url":"https://github.com/surrealdb/surrealdb/pull/6247"},{"url":"https://github.com/surrealdb/surrealdb/security/advisories/GHSA-7vm2-j586-vcvc"},{"url":"https://surrealdb.com/docs/surrealql/statements/live"}],"datePublic":"2025-09-11T21:53:23.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"Incorrect Authorization","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-863: Incorrect Authorization","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2025-09-11T23:02:48.639Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-09-11T21:53:23.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-11-07T19:42:32.972Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-26T13:04:07.005443Z","id":"CVE-2025-11060","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-26T13:04:11.588Z"}}]}}