Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65112: CWE-862: Missing Authorization in ricardoboss PubNet

0
Critical
VulnerabilityCVE-2025-65112cvecve-2025-65112cwe-862cwe-306
Published: Sat Nov 29 2025 (11/29/2025, 00:38:41 UTC)
Source: CVE Database V5
Vendor/Project: ricardoboss
Product: PubNet

Description

PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:29:04 UTC

Technical Analysis

CVE-2025-65112 is a critical security vulnerability identified in ricardoboss PubNet, a self-hosted package service for Dart and Flutter ecosystems. The vulnerability exists in versions prior to 1.1.3, specifically in the /api/storage/upload endpoint, which fails to enforce authorization controls. This missing authorization (CWE-862) allows unauthenticated attackers to upload packages under arbitrary author IDs, effectively enabling identity spoofing and privilege escalation. Attackers can exploit this flaw to inject malicious packages into the supply chain, potentially compromising downstream users and systems relying on these packages. The vulnerability is classified under CWE-862 (Missing Authorization) and CWE-306 (Missing Authentication for Critical Function), highlighting the absence of proper access control mechanisms. The CVSS v3.1 base score is 9.4 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality and integrity, with some impact on availability. Although no active exploits have been reported, the potential for supply chain attacks makes this vulnerability particularly dangerous. The issue was addressed in PubNet version 1.1.3, which introduced proper authorization checks on the upload endpoint to prevent unauthorized package uploads. Organizations using PubNet should prioritize upgrading to the patched version and review their package management security policies to prevent similar issues.

Potential Impact

The impact of CVE-2025-65112 on European organizations can be substantial, especially those involved in software development using Dart and Flutter technologies. The vulnerability allows attackers to impersonate legitimate package authors and upload malicious code, which can propagate through the software supply chain, affecting multiple projects and organizations. This can lead to widespread compromise of software integrity, data breaches, and potential disruption of services relying on compromised packages. The confidentiality of sensitive information may be jeopardized if malicious packages exfiltrate data or introduce backdoors. Integrity is severely impacted as attackers can alter or inject malicious code into trusted packages, undermining trust in the software supply chain. Availability impact is lower but still present if malicious packages cause application failures or denial of service. European organizations with critical infrastructure, government agencies, and large enterprises that depend on secure software supply chains are at heightened risk. Additionally, the vulnerability could facilitate espionage or sabotage in the context of geopolitical tensions, making it a strategic concern for European cybersecurity.

Mitigation Recommendations

To mitigate CVE-2025-65112, European organizations should take the following specific actions: 1) Immediately upgrade all instances of ricardoboss PubNet to version 1.1.3 or later, which includes the necessary authorization fixes. 2) Implement strict access control policies on package upload endpoints, ensuring that only authenticated and authorized users can upload packages. 3) Employ package signing and verification mechanisms to validate the authenticity and integrity of packages before acceptance and distribution. 4) Monitor upload activity logs for unusual patterns, such as uploads from unexpected users or IP addresses, and establish alerting for suspicious behavior. 5) Conduct regular audits of package repositories to detect unauthorized or malicious packages. 6) Educate developers and DevOps teams about the risks of supply chain attacks and the importance of secure package management. 7) Consider deploying runtime protection and anomaly detection tools to identify and block malicious package execution. 8) Collaborate with the wider Dart and Flutter community to share threat intelligence and best practices for securing package ecosystems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.694Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a43d62a13ea799f1dc479

Added to database: 11/29/2025, 12:52:38 AM

Last enriched: 12/6/2025, 4:29:04 AM

Last updated: 1/13/2026, 10:25:59 PM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats