CVE-2025-65112: CWE-862: Missing Authorization in ricardoboss PubNet
PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.
AI Analysis
Technical Summary
CVE-2025-65112 is a critical security vulnerability identified in ricardoboss PubNet, a self-hosted package service for Dart and Flutter ecosystems. The vulnerability exists in versions prior to 1.1.3, specifically in the /api/storage/upload endpoint, which fails to enforce authorization controls. This missing authorization (CWE-862) allows unauthenticated attackers to upload packages under arbitrary author IDs, effectively enabling identity spoofing and privilege escalation. Attackers can exploit this flaw to inject malicious packages into the supply chain, potentially compromising downstream users and systems relying on these packages. The vulnerability is classified under CWE-862 (Missing Authorization) and CWE-306 (Missing Authentication for Critical Function), highlighting the absence of proper access control mechanisms. The CVSS v3.1 base score is 9.4 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality and integrity, with some impact on availability. Although no active exploits have been reported, the potential for supply chain attacks makes this vulnerability particularly dangerous. The issue was addressed in PubNet version 1.1.3, which introduced proper authorization checks on the upload endpoint to prevent unauthorized package uploads. Organizations using PubNet should prioritize upgrading to the patched version and review their package management security policies to prevent similar issues.
Potential Impact
The impact of CVE-2025-65112 on European organizations can be substantial, especially those involved in software development using Dart and Flutter technologies. The vulnerability allows attackers to impersonate legitimate package authors and upload malicious code, which can propagate through the software supply chain, affecting multiple projects and organizations. This can lead to widespread compromise of software integrity, data breaches, and potential disruption of services relying on compromised packages. The confidentiality of sensitive information may be jeopardized if malicious packages exfiltrate data or introduce backdoors. Integrity is severely impacted as attackers can alter or inject malicious code into trusted packages, undermining trust in the software supply chain. Availability impact is lower but still present if malicious packages cause application failures or denial of service. European organizations with critical infrastructure, government agencies, and large enterprises that depend on secure software supply chains are at heightened risk. Additionally, the vulnerability could facilitate espionage or sabotage in the context of geopolitical tensions, making it a strategic concern for European cybersecurity.
Mitigation Recommendations
To mitigate CVE-2025-65112, European organizations should take the following specific actions: 1) Immediately upgrade all instances of ricardoboss PubNet to version 1.1.3 or later, which includes the necessary authorization fixes. 2) Implement strict access control policies on package upload endpoints, ensuring that only authenticated and authorized users can upload packages. 3) Employ package signing and verification mechanisms to validate the authenticity and integrity of packages before acceptance and distribution. 4) Monitor upload activity logs for unusual patterns, such as uploads from unexpected users or IP addresses, and establish alerting for suspicious behavior. 5) Conduct regular audits of package repositories to detect unauthorized or malicious packages. 6) Educate developers and DevOps teams about the risks of supply chain attacks and the importance of secure package management. 7) Consider deploying runtime protection and anomaly detection tools to identify and block malicious package execution. 8) Collaborate with the wider Dart and Flutter community to share threat intelligence and best practices for securing package ecosystems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-65112: CWE-862: Missing Authorization in ricardoboss PubNet
Description
PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-65112 is a critical security vulnerability identified in ricardoboss PubNet, a self-hosted package service for Dart and Flutter ecosystems. The vulnerability exists in versions prior to 1.1.3, specifically in the /api/storage/upload endpoint, which fails to enforce authorization controls. This missing authorization (CWE-862) allows unauthenticated attackers to upload packages under arbitrary author IDs, effectively enabling identity spoofing and privilege escalation. Attackers can exploit this flaw to inject malicious packages into the supply chain, potentially compromising downstream users and systems relying on these packages. The vulnerability is classified under CWE-862 (Missing Authorization) and CWE-306 (Missing Authentication for Critical Function), highlighting the absence of proper access control mechanisms. The CVSS v3.1 base score is 9.4 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality and integrity, with some impact on availability. Although no active exploits have been reported, the potential for supply chain attacks makes this vulnerability particularly dangerous. The issue was addressed in PubNet version 1.1.3, which introduced proper authorization checks on the upload endpoint to prevent unauthorized package uploads. Organizations using PubNet should prioritize upgrading to the patched version and review their package management security policies to prevent similar issues.
Potential Impact
The impact of CVE-2025-65112 on European organizations can be substantial, especially those involved in software development using Dart and Flutter technologies. The vulnerability allows attackers to impersonate legitimate package authors and upload malicious code, which can propagate through the software supply chain, affecting multiple projects and organizations. This can lead to widespread compromise of software integrity, data breaches, and potential disruption of services relying on compromised packages. The confidentiality of sensitive information may be jeopardized if malicious packages exfiltrate data or introduce backdoors. Integrity is severely impacted as attackers can alter or inject malicious code into trusted packages, undermining trust in the software supply chain. Availability impact is lower but still present if malicious packages cause application failures or denial of service. European organizations with critical infrastructure, government agencies, and large enterprises that depend on secure software supply chains are at heightened risk. Additionally, the vulnerability could facilitate espionage or sabotage in the context of geopolitical tensions, making it a strategic concern for European cybersecurity.
Mitigation Recommendations
To mitigate CVE-2025-65112, European organizations should take the following specific actions: 1) Immediately upgrade all instances of ricardoboss PubNet to version 1.1.3 or later, which includes the necessary authorization fixes. 2) Implement strict access control policies on package upload endpoints, ensuring that only authenticated and authorized users can upload packages. 3) Employ package signing and verification mechanisms to validate the authenticity and integrity of packages before acceptance and distribution. 4) Monitor upload activity logs for unusual patterns, such as uploads from unexpected users or IP addresses, and establish alerting for suspicious behavior. 5) Conduct regular audits of package repositories to detect unauthorized or malicious packages. 6) Educate developers and DevOps teams about the risks of supply chain attacks and the importance of secure package management. 7) Consider deploying runtime protection and anomaly detection tools to identify and block malicious package execution. 8) Collaborate with the wider Dart and Flutter community to share threat intelligence and best practices for securing package ecosystems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692a43d62a13ea799f1dc479
Added to database: 11/29/2025, 12:52:38 AM
Last enriched: 12/6/2025, 4:29:04 AM
Last updated: 1/13/2026, 10:25:59 PM
Views: 186
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21301: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler
MediumCVE-2026-21299: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Modeler
HighCVE-2025-13447: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster
HighCVE-2025-13444: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster
HighCVE-2026-23478: CWE-602: Client-Side Enforcement of Server-Side Security in calcom cal.com
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.