{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-3115","assignerOrgId":"4f830c72-39e4-45f6-a99f-78cc01ae04db","state":"PUBLISHED","assignerShortName":"tibco","dateReserved":"2025-04-02T10:56:03.148Z","datePublished":"2025-04-09T18:12:28.348Z","dateUpdated":"2025-11-11T11:47:58.064Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Spotfire Statistics Services","vendor":"Spotfire","versions":[{"lessThan":"14.0.7","status":"affected","version":"14","versionType":"Patch"},{"status":"affected","version":"14.1.0","versionType":"Patch"},{"status":"affected","version":"14.2.0","versionType":"Patch"},{"status":"affected","version":"14.3.0","versionType":"Patch"},{"status":"affected","version":"14.4.0","versionType":"Patch"},{"status":"affected","version":"14.4.1","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire Analyst","vendor":"Spotfire","versions":[{"lessThan":"14.0.6","status":"affected","version":"14.0","versionType":"Patch"},{"status":"affected","version":"14.1.0","versionType":"Patch"},{"status":"affected","version":"14.2.0","versionType":"Patch"},{"status":"affected","version":"14.3.0","versionType":"Patch"},{"status":"affected","version":"14.4.0","versionType":"Patch"},{"status":"affected","version":"14.4.1","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Deployment Kit used in Spotfire Server","vendor":"Spotfire","versions":[{"lessThan":"14.0.7","status":"affected","version":"14.0","versionType":"Patch"},{"status":"affected","version":"14.1.0","versionType":"Patch"},{"status":"affected","version":"14.2.0","versionType":"Patch"},{"status":"affected","version":"14.3.0","versionType":"Patch"},{"status":"affected","version":"14.4.0","versionType":"Patch"},{"status":"affected","version":"14.4.1","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire Desktop","vendor":"Spotfire","versions":[{"lessThan":"14.4.2","status":"affected","version":"14.4","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire for AWS Marketplace","vendor":"Spotfire","versions":[{"lessThan":"14.4.2","status":"unknown","version":"14.4","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire Enterprise Runtime for R - Server Edition","vendor":"Spotfire","versions":[{"lessThan":"1.17.7","status":"affected","version":"1.17","versionType":"Patch"},{"status":"affected","version":"1.18.0","versionType":"Patch"},{"status":"affected","version":"1.19.0","versionType":"Patch"},{"status":"affected","version":"1.20.0","versionType":"Patch"},{"status":"affected","version":"1.21.0","versionType":"Patch"},{"status":"affected","version":"1.21.1","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire Service for Python","vendor":"Spotfire","versions":[{"lessThan":"1.17.7","status":"affected","version":"1.17","versionType":"Patch"},{"lessThanOrEqual":"1.21.1","status":"affected","version":"1.18.0","versionType":"Patch"}]},{"defaultStatus":"unknown","product":"Spotfire Service for R","vendor":"Spotfire","versions":[{"lessThan":"1.17.7","status":"affected","version":"1.17","versionType":"Patch"},{"lessThanOrEqual":"1.21.1","status":"affected","version":"1.18.0","versionType":"Patch"}]}],"datePublic":"2025-04-08T16:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\n\n<strong>Injection Vulnerabilities: </strong><span style=\"background-color: rgb(255, 255, 255);\">Attackers can inject malicious code, potentially gaining control over the system executing these functions.</span><br><span style=\"background-color: rgb(255, 255, 255);\">Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution</span>\n\n<br></p>"}],"value":"Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.4,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"4f830c72-39e4-45f6-a99f-78cc01ae04db","shortName":"tibco","dateUpdated":"2025-11-11T11:47:58.064Z"},"references":[{"url":"https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"}],"source":{"discovery":"UNKNOWN"},"title":"Spotfire Data Function Vulnerability","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-09T18:28:35.698097Z","id":"CVE-2025-3115","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-09T18:29:39.691Z"}}]}}