MEDIUMCVE-2025-64499CVSS 4.6

Tuleap está faltando proteções CSRF para sua API de gerenciamento de planejamento

Plataforma

php

Componente

tuleap

Corrigido em

17.0.100

17.0.1

16.13.1

16.12.1

AI Confidence: highNVDEPSS 0.0%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2025-64499 describes a Cross-Site Request Forgery (CSRF) vulnerability discovered in Tuleap, a free and open-source suite for software development and collaboration management. This vulnerability allows attackers to manipulate the planning management API, potentially leading to unauthorized creation, modification, or deletion of plans. The vulnerability impacts Tuleap Enterprise Edition versions prior to 16.13-7, as well as Community Edition versions before 17.0.99.1762456922. A fix is available in Tuleap Enterprise Edition versions 16.13.1, 16.12-10, and 17.0-2.

Impacto e Cenários de Ataquetraduzindo…

Successful exploitation of CVE-2025-64499 allows an attacker to execute arbitrary actions within the Tuleap environment through a victim's authenticated session. Specifically, they can create, edit, or delete plans, potentially disrupting workflows, introducing malicious configurations, or gaining unauthorized access to sensitive data related to software development and collaboration. The blast radius extends to any user with access to the planning management API, and a compromised plan could impact multiple projects and teams. While the vulnerability doesn't directly lead to system compromise, it can be a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations.

Contexto de Exploraçãotraduzindo…

CVE-2025-64499 is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, suggesting a lower probability of immediate widespread exploitation. However, the ease of CSRF exploitation means that this vulnerability could be targeted by opportunistic attackers. The vulnerability was publicly disclosed on 2025-12-08.

Quem Está em Riscotraduzindo…

Organizations heavily reliant on Tuleap for software development and collaboration management are at risk, particularly those running older versions of Tuleap Enterprise Edition. Shared hosting environments where multiple users share the same Tuleap instance are also at increased risk, as a compromised user account could be used to exploit the vulnerability and impact other users.

Passos de Detecçãotraduzindo…

• php: Examine Tuleap application logs for suspicious requests related to the planning management API, particularly those originating from unexpected IP addresses or user agents.

grep -i 'planning management api' /var/log/apache2/access.log

• generic web: Monitor Tuleap's web application firewall (WAF) logs for CSRF attack patterns, such as requests with unexpected referer headers or unusual request parameters. • generic web: Check response headers for the presence of CSRF protection tokens. Absence of these tokens could indicate a misconfiguration or lack of protection. • generic web: Use a web proxy to intercept and analyze HTTP requests to the planning management API, looking for suspicious parameters or actions.

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.02% (percentil 5%)

CISA SSVC

Exploraçãonone
Automatizávelno
Impacto Técnicopartial

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L4.6MEDIUMAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredLowNível de autenticação necessárioUser InteractionRequiredSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityNoneRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityLowRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Baixo — qualquer conta de usuário válida é suficiente.
User Interaction
Necessária — a vítima deve abrir um arquivo, clicar em um link ou visitar uma página.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Nenhum — sem impacto na confidencialidade.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Baixo — negação de serviço parcial ou intermitente.

Software Afetado

Componentetuleap
FornecedorEnalean
Faixa afetadaCorrigido em
Tuleap Community Edition < 17.0.99.1762456922 – Tuleap Community Edition < 17.0.99.176245692217.0.100
Tuleap Enterprise Edition < 17.0-2 – Tuleap Enterprise Edition < 17.0-217.0.1
Tuleap Enterprise Edition < 16.13-7 – Tuleap Enterprise Edition < 16.13-716.13.1
Tuleap Enterprise Edition < 16.12-10 – Tuleap Enterprise Edition < 16.12-1016.12.1

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2025-64499 is to upgrade Tuleap Enterprise Edition to version 16.13.1 or later, or to version 16.12-10 or 17.0-2. If an immediate upgrade is not feasible, consider implementing stricter input validation and output encoding on the planning management API to reduce the attack surface. Implementing CSRF protection mechanisms, such as synchronizer tokens or double-submit cookies, can also help mitigate the risk. Review and restrict access to the planning management API to only authorized users. After upgrading, confirm the fix by attempting to trigger a plan creation/modification request from a separate browser session without valid credentials; the request should be rejected.

Como corrigir

Atualize Tuleap Community Edition para a versão 17.0.99.1762456922 ou superior. Para Tuleap Enterprise Edition, atualize para a versão 17.0-2, 16.13-7, 16.12-10 ou superior, conforme apropriado para sua versão atual. Isso corrigirá a vulnerabilidade CSRF na API de gerenciamento de planejamento.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2025-64499 — CSRF in Tuleap Enterprise Edition?

CVE-2025-64499 is a Cross-Site Request Forgery (CSRF) vulnerability in Tuleap Enterprise Edition versions prior to 16.13-7, allowing attackers to manipulate the planning management API.

Am I affected by CVE-2025-64499 in Tuleap Enterprise Edition?

You are affected if you are running Tuleap Enterprise Edition versions prior to 16.13-7, 16.12-10, or 17.0-2.

How do I fix CVE-2025-64499 in Tuleap Enterprise Edition?

Upgrade to Tuleap Enterprise Edition version 16.13.1 or later, or to version 16.12-10 or 17.0-2. Consider implementing CSRF protection mechanisms as an interim measure.

Is CVE-2025-64499 being actively exploited?

While there are no widespread reports of active exploitation, the ease of CSRF exploitation means it could be targeted by opportunistic attackers.

Where can I find the official Tuleap advisory for CVE-2025-64499?

Refer to the official Tuleap security advisories on their website for the most up-to-date information and guidance.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.