Description
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9
Patch x_refsource_misc
https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://tuleap.net/plugins/tracker/?aid=41850
Scores
CVSS v3
4.6
EPSS
0.0015
EPSS Percentile
35.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-440
Status
published
Products (2)
enalean/tuleap
< 16.3-11
enalean/tuleap
< 16.4.99.1740498975
Published
Mar 04, 2025
Tracked Since
Feb 18, 2026