Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64498: CWE-352: Cross-Site Request Forgery (CSRF) in Enalean tuleap

0
Medium
VulnerabilityCVE-2025-64498cvecve-2025-64498cwe-352
Published: Mon Dec 08 2025 (12/08/2025, 22:36:26 UTC)
Source: CVE Database V5
Vendor/Project: Enalean
Product: tuleap

Description

Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.

AI-Powered Analysis

AILast updated: 12/16/2025, 06:00:08 UTC

Technical Analysis

CVE-2025-64498 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Enalean's Tuleap software, an open-source suite widely used for software development management and collaboration. The vulnerability affects Community Edition versions below 17.0.99.1762444754 and Enterprise Edition versions prior to 17.0-2, 16.13-7, and 16.12-10. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on web applications without their consent. In this case, attackers can trick victims into changing tracker general settings, which are critical for managing issue tracking and project workflows. The CVSS 3.1 base score is 4.6 (medium severity), reflecting that the attack vector is network-based with low attack complexity but requires privileges and user interaction. The impact primarily affects integrity and availability, as unauthorized changes to tracker settings can disrupt project management processes or degrade system reliability. No confidentiality impact is noted. Exploitation does not require elevated privileges beyond those of the victim user, but the victim must be authenticated and interact with malicious content. No public exploits are known at this time. The vulnerability was reserved in early November 2025 and published in December 2025. The fix involves updating to the patched versions mentioned, which implement proper CSRF protections to validate requests and prevent unauthorized state changes. Given Tuleap's role in software development environments, this vulnerability could undermine project integrity and disrupt collaboration if exploited.

Potential Impact

For European organizations, the vulnerability poses a risk to the integrity and availability of software development processes managed through Tuleap. Unauthorized changes to tracker settings could lead to mismanagement of issues, loss of data consistency, or denial of service in project tracking workflows. This can delay development cycles, introduce errors, and reduce operational efficiency. Organizations in sectors with stringent compliance requirements or critical software development activities (e.g., finance, healthcare, telecommunications) may face increased operational and reputational risks. Since exploitation requires authenticated users and user interaction, insider threats or targeted phishing campaigns could leverage this vulnerability. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to opportunistic or targeted attacks. The impact is more pronounced in organizations heavily reliant on Tuleap for project management and collaboration, especially those with distributed teams where remote exploitation is feasible.

Mitigation Recommendations

The primary mitigation is to upgrade affected Tuleap installations to the fixed versions: Community Edition 17.0.99.1762444754 or Enterprise Editions 17.0-2, 16.13-7, and 16.12-10. Organizations should verify their current Tuleap versions and plan timely patching. Additionally, implement or verify the presence of robust CSRF protections such as anti-CSRF tokens, same-site cookies, and strict referer header validation. Limit user privileges to the minimum necessary to reduce the risk of privilege abuse. Conduct user awareness training to recognize and avoid phishing or social engineering attempts that could trigger CSRF attacks. Monitor logs and configuration changes for unusual activity indicative of exploitation attempts. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF patterns. Finally, integrate vulnerability management processes to ensure timely updates of Tuleap and related software components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T19:12:25.103Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693755498d836cc4e0fc05cb

Added to database: 12/8/2025, 10:46:33 PM

Last enriched: 12/16/2025, 6:00:08 AM

Last updated: 2/7/2026, 1:14:06 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats