Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65112: CWE-862: Missing Authorization in ricardoboss PubNet

0
Critical
VulnerabilityCVE-2025-65112cvecve-2025-65112cwe-862cwe-306
Published: Sat Nov 29 2025 (11/29/2025, 00:38:41 UTC)
Source: CVE Database V5
Vendor/Project: ricardoboss
Product: PubNet

Description

PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.

AI-Powered Analysis

AILast updated: 11/29/2025, 01:07:39 UTC

Technical Analysis

CVE-2025-65112 is a critical missing authorization vulnerability (CWE-862) in ricardoboss PubNet, a self-hosted package service for Dart and Flutter ecosystems. The vulnerability exists in versions prior to 1.1.3, specifically in the /api/storage/upload REST API endpoint. This endpoint does not enforce authentication or authorization checks, allowing any unauthenticated user to upload packages while specifying arbitrary author-id values. Consequently, attackers can impersonate legitimate users, escalating privileges and injecting malicious packages into the supply chain. This can lead to widespread compromise of downstream software that relies on these packages. The vulnerability also relates to CWE-306 (missing authentication), compounding the risk. The CVSS 3.1 score of 9.4 indicates network exploitable (AV:N), no privileges required (PR:N), no user interaction (UI:N), with high confidentiality and integrity impacts and low availability impact. Although no known exploits are currently reported in the wild, the ease of exploitation and potential damage make this a critical threat. The issue was publicly disclosed on November 29, 2025, and patched in version 1.1.3 of PubNet. Organizations using PubNet for internal or external package hosting must urgently update to prevent identity spoofing and supply chain compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk to software supply chain integrity and trust. Attackers can upload malicious packages masquerading as trusted developers, potentially distributing malware or backdoors to internal applications or public-facing software. This can lead to data breaches, intellectual property theft, and operational disruptions. The identity spoofing aspect undermines accountability and audit trails, complicating incident response. Organizations relying on PubNet for Dart and Flutter package management, especially in sectors like finance, healthcare, and critical infrastructure, face elevated risks. The widespread adoption of Dart and Flutter in Europe’s growing mobile and web development markets increases the attack surface. Furthermore, supply chain attacks can cascade, affecting partner organizations and customers, amplifying the impact across the European digital ecosystem.

Mitigation Recommendations

Immediate mitigation requires upgrading all PubNet instances to version 1.1.3 or later, where the authorization checks on the /api/storage/upload endpoint are enforced. Organizations should audit all package uploads during the vulnerable period to detect unauthorized or suspicious packages. Implement network-level access controls to restrict access to the PubNet API to trusted users and systems. Employ multi-factor authentication and robust identity management for package repository access. Integrate package signing and verification mechanisms to ensure package integrity and provenance. Monitor logs for anomalous upload activity and conduct regular security assessments of the package infrastructure. Additionally, educate developers and DevOps teams about supply chain risks and enforce strict policies on package acceptance and deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.694Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a43d62a13ea799f1dc479

Added to database: 11/29/2025, 12:52:38 AM

Last enriched: 11/29/2025, 1:07:39 AM

Last updated: 11/29/2025, 6:37:42 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats