Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66422: CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak') in Tryton trytond

0
Medium
VulnerabilityCVE-2025-66422cvecve-2025-66422cwe-402
Published: Sun Nov 30 2025 (11/30/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Tryton
Product: trytond

Description

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.

AI-Powered Analysis

AILast updated: 11/30/2025, 03:08:41 UTC

Technical Analysis

CVE-2025-66422 is a vulnerability identified in the Tryton ERP system's trytond server component, affecting versions prior to 7.6.11, 7.4.21, 7.0.40, and 6.0.70. The issue is classified under CWE-402, which relates to the transmission of private resources into a new sphere, commonly known as a resource leak. Specifically, this vulnerability allows remote attackers with low privileges to obtain sensitive trace-back information from the server setup. This trace-back information can include detailed error messages, stack traces, or configuration details that are not intended for exposure. Such information disclosure can aid attackers in reconnaissance, helping them understand the server environment and potentially identify further vulnerabilities or misconfigurations to exploit. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require some level of privileges (PR:L) to trigger. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning the attack vector is network-based, with low attack complexity, requiring privileges, no user interaction, unchanged scope, and only confidentiality impact. There are no known exploits in the wild at the time of publication. The vulnerability has been addressed in the specified patched versions, and users are advised to upgrade accordingly to prevent information leakage.

Potential Impact

For European organizations using Tryton ERP, this vulnerability poses a risk of sensitive information disclosure that could facilitate further targeted attacks. Although it does not directly impact data integrity or system availability, the leakage of server trace-back details can provide attackers with insights into the internal workings and configurations of the trytond server. This can increase the likelihood of successful exploitation of other vulnerabilities or unauthorized access attempts. Organizations handling sensitive business data or operating in regulated sectors such as finance, healthcare, or government may face compliance risks if such information leakage leads to broader security incidents. The medium severity rating reflects a moderate risk level, but the ease of remote exploitation and the potential for information gathering make timely remediation important. The absence of known exploits reduces immediate risk but should not lead to complacency.

Mitigation Recommendations

1. Upgrade all affected Tryton trytond instances to the fixed versions 7.6.11, 7.4.21, 7.0.40, or 6.0.70 as soon as possible. 2. Restrict network access to the trytond service to trusted IP addresses and internal networks only, minimizing exposure to potential attackers. 3. Implement robust authentication and authorization controls to limit privileges required to access trytond services, reducing the risk of exploitation. 4. Monitor server logs for unusual access patterns or error messages that could indicate attempts to exploit this vulnerability. 5. Conduct regular security assessments and penetration testing focused on ERP systems to identify and remediate similar information disclosure issues. 6. Educate system administrators about the risks of information leakage and the importance of applying vendor patches promptly. 7. Consider deploying web application firewalls or intrusion detection systems that can detect and block attempts to access sensitive error information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692bb1a5b00568eef0c4003c

Added to database: 11/30/2025, 2:53:25 AM

Last enriched: 11/30/2025, 3:08:41 AM

Last updated: 12/4/2025, 8:00:19 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats