Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65109: CWE-830: Inclusion of Web Functionality from an Untrusted Source in mindersec minder

0
High
VulnerabilityCVE-2025-65109cvecve-2025-65109cwe-830
Published: Fri Nov 21 2025 (11/21/2025, 21:56:53 UTC)
Source: CVE Database V5
Vendor/Project: mindersec
Product: minder

Description

Minder is an open source software supply chain security platform. In Minder Helm version 0.20241106.3386+ref.2507dbf and Minder Go versions from 0.0.72 to 0.0.83, Minder users may fetch content in the context of the Minder server, which may include URLs which the user would not normally have access to. This issue has been patched in Minder Helm version 0.20250203.3849+ref.fdc94f0 and Minder Go version 0.0.84.

AI-Powered Analysis

AILast updated: 11/21/2025, 22:08:34 UTC

Technical Analysis

CVE-2025-65109 is classified under CWE-830, which involves the inclusion of web functionality from untrusted sources. Minder, an open source software supply chain security platform, in its Helm and Go implementations, allowed users to fetch content in the context of the Minder server. Specifically, in Minder Helm version 0.20241106.3386+ref.2507dbf and Minder Go versions 0.0.72 through 0.0.83, the software did not properly restrict URLs that users could request, enabling them to access internal or otherwise restricted resources via the Minder server. This flaw arises because the server processes user-supplied URLs without adequate validation or access control, effectively allowing an attacker to perform unauthorized internal requests or data retrieval. The vulnerability has a CVSS 4.0 base score of 8.5, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required beyond limited user access, and no user interaction needed. The impact on confidentiality is high, as sensitive internal data may be exposed; integrity impact is low, and availability impact is low. The scope is high as the vulnerability affects the Minder server environment, potentially exposing multiple internal resources. The issue was publicly disclosed on November 21, 2025, and patches are available in Minder Helm version 0.20250203.3849+ref.fdc94f0 and Minder Go version 0.0.84. No known exploits in the wild have been reported yet.

Potential Impact

For European organizations relying on Minder for software supply chain security, this vulnerability poses a significant risk to the confidentiality of internal data and resources. Attackers exploiting this flaw could access sensitive URLs and data that are normally protected, potentially leading to leakage of proprietary information, credentials, or internal infrastructure details. This could facilitate further attacks such as lateral movement, espionage, or supply chain compromise. The integrity of the supply chain security process may also be undermined if attackers manipulate fetched content or metadata. Given the critical role of supply chain security in safeguarding software integrity, this vulnerability could have cascading effects on trust and compliance, especially under stringent European data protection regulations like GDPR. The availability impact is limited but could arise if attackers leverage the vulnerability to disrupt Minder services. Organizations using vulnerable Minder versions in critical infrastructure, finance, or government sectors are particularly at risk.

Mitigation Recommendations

European organizations should immediately upgrade to the patched versions of Minder: Helm version 0.20250203.3849+ref.fdc94f0 or later, and Go version 0.0.84 or later. Until patches are applied, restrict network access to Minder servers to trusted users and networks only, employing strict firewall rules and network segmentation to limit exposure. Implement robust monitoring and logging of Minder server requests to detect anomalous URL fetch attempts or unusual access patterns. Conduct thorough audits of Minder configurations to ensure no unintended URL fetching from untrusted sources is enabled. Employ web application firewalls (WAFs) with custom rules to block suspicious outbound requests initiated by Minder. Additionally, review and tighten user permissions within Minder to minimize the risk of exploitation by low-privilege users. Finally, integrate this vulnerability into incident response plans and conduct staff awareness training focused on supply chain security risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.694Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6920e16727835fd566e05955

Added to database: 11/21/2025, 10:02:15 PM

Last enriched: 11/21/2025, 10:08:34 PM

Last updated: 11/22/2025, 10:20:36 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats