{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64497","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-05T19:12:25.103Z","datePublished":"2025-12-08T22:28:49.215Z","dateUpdated":"2025-12-09T16:04:48.900Z"},"containers":{"cna":{"title":"Tuleap exposes releases for all projects to File Release System project administrators","problemTypes":[{"descriptions":[{"cweId":"CWE-639","lang":"en","description":"CWE-639: Authorization Bypass Through User-Controlled Key","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-v6vm-6rxf-7p2v","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-v6vm-6rxf-7p2v"},{"name":"https://github.com/Enalean/tuleap/commit/403eb69f4cfafe52254c8f9bdbe66e1fedadc254","tags":["x_refsource_MISC"],"url":"https://github.com/Enalean/tuleap/commit/403eb69f4cfafe52254c8f9bdbe66e1fedadc254"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=403eb69f4cfafe52254c8f9bdbe66e1fedadc254","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=403eb69f4cfafe52254c8f9bdbe66e1fedadc254"},{"name":"https://tuleap.net/plugins/tracker/?aid=45583","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/tracker/?aid=45583"}],"affected":[{"vendor":"Enalean","product":"tuleap","versions":[{"version":"Tuleap Community Edition < 17.0.99.1762431347","status":"affected"},{"version":"Tuleap Enterprise Edition < 17.0-2","status":"affected"},{"version":"Tuleap Enterprise Edition < 16.13-7","status":"affected"},{"version":"Tuleap Enterprise Edition < 16.12-10","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-08T22:28:49.215Z"},"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of  Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition."}],"source":{"advisory":"GHSA-v6vm-6rxf-7p2v","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:19:51.779452Z","id":"CVE-2025-64497","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T16:04:48.900Z"}}]}}