Vulnerability Details CVE-2025-22129
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.2%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2025-22129
-
cpe:2.3:a:enalean:tuleap:-
-
cpe:2.3:a:enalean:tuleap:11.15-1
-
cpe:2.3:a:enalean:tuleap:11.15-8
-
cpe:2.3:a:enalean:tuleap:11.16-1
-
cpe:2.3:a:enalean:tuleap:11.16-6
-
cpe:2.3:a:enalean:tuleap:11.16-7
-
cpe:2.3:a:enalean:tuleap:11.16.99.173
-
cpe:2.3:a:enalean:tuleap:11.17-1
-
cpe:2.3:a:enalean:tuleap:11.17-5
-
cpe:2.3:a:enalean:tuleap:11.17.99.144
-
cpe:2.3:a:enalean:tuleap:11.17.99.146
-
cpe:2.3:a:enalean:tuleap:12.10
-
cpe:2.3:a:enalean:tuleap:12.11-2
-
cpe:2.3:a:enalean:tuleap:12.9.99.228
-
cpe:2.3:a:enalean:tuleap:13.12-6
-
cpe:2.3:a:enalean:tuleap:13.6-5
-
cpe:2.3:a:enalean:tuleap:13.7-1
-
cpe:2.3:a:enalean:tuleap:13.7-4
-
cpe:2.3:a:enalean:tuleap:13.7.99.239
-
cpe:2.3:a:enalean:tuleap:13.8.99.49
-
cpe:2.3:a:enalean:tuleap:14.0
-
cpe:2.3:a:enalean:tuleap:14.0-3
-
cpe:2.3:a:enalean:tuleap:14.0.99.24
-
cpe:2.3:a:enalean:tuleap:14.10
-
cpe:2.3:a:enalean:tuleap:14.10-2
-
cpe:2.3:a:enalean:tuleap:14.10.99.4
-
cpe:2.3:a:enalean:tuleap:14.11.99.34
-
cpe:2.3:a:enalean:tuleap:14.12-1
-
cpe:2.3:a:enalean:tuleap:14.12-6
-
cpe:2.3:a:enalean:tuleap:14.4-7
-
cpe:2.3:a:enalean:tuleap:14.5
-
cpe:2.3:a:enalean:tuleap:14.5-2
-
cpe:2.3:a:enalean:tuleap:14.5.99.4
-
cpe:2.3:a:enalean:tuleap:14.7-7
-
cpe:2.3:a:enalean:tuleap:14.7.99.143
-
cpe:2.3:a:enalean:tuleap:14.7.99.76
-
cpe:2.3:a:enalean:tuleap:14.8
-
cpe:2.3:a:enalean:tuleap:14.8-3
-
cpe:2.3:a:enalean:tuleap:14.8.99.60
-
cpe:2.3:a:enalean:tuleap:14.9-5
-
cpe:2.3:a:enalean:tuleap:15.0-1
-
cpe:2.3:a:enalean:tuleap:15.0-9
-
cpe:2.3:a:enalean:tuleap:15.1-1
-
cpe:2.3:a:enalean:tuleap:15.1-8
-
cpe:2.3:a:enalean:tuleap:15.1-9
-
cpe:2.3:a:enalean:tuleap:15.10
-
cpe:2.3:a:enalean:tuleap:15.10-6
-
cpe:2.3:a:enalean:tuleap:15.10.99.128
-
cpe:2.3:a:enalean:tuleap:15.2
-
cpe:2.3:a:enalean:tuleap:15.2-1
-
cpe:2.3:a:enalean:tuleap:15.2-4
-
cpe:2.3:a:enalean:tuleap:15.2-5
-
cpe:2.3:a:enalean:tuleap:15.2.99.103
-
cpe:2.3:a:enalean:tuleap:15.2.99.49
-
cpe:2.3:a:enalean:tuleap:15.3-1
-
cpe:2.3:a:enalean:tuleap:15.3-6
-
cpe:2.3:a:enalean:tuleap:15.3.5
-
cpe:2.3:a:enalean:tuleap:15.4-1
-
cpe:2.3:a:enalean:tuleap:15.4-7
-
cpe:2.3:a:enalean:tuleap:15.4-8
-
cpe:2.3:a:enalean:tuleap:15.4.99.140
-
cpe:2.3:a:enalean:tuleap:15.5
-
cpe:2.3:a:enalean:tuleap:15.5-1
-
cpe:2.3:a:enalean:tuleap:15.5-4
-
cpe:2.3:a:enalean:tuleap:15.5-6
-
cpe:2.3:a:enalean:tuleap:15.5.99.76
-
cpe:2.3:a:enalean:tuleap:15.6-1
-
cpe:2.3:a:enalean:tuleap:15.6-5
-
cpe:2.3:a:enalean:tuleap:15.7-1
-
cpe:2.3:a:enalean:tuleap:15.7.99.6
-
cpe:2.3:a:enalean:tuleap:15.8-5
-
cpe:2.3:a:enalean:tuleap:15.9
-
cpe:2.3:a:enalean:tuleap:15.9-3
-
cpe:2.3:a:enalean:tuleap:15.9-8
-
cpe:2.3:a:enalean:tuleap:15.9.99.97
-
cpe:2.3:a:enalean:tuleap:16.0-7
-
cpe:2.3:a:enalean:tuleap:16.1
-
cpe:2.3:a:enalean:tuleap:16.1-4
-
cpe:2.3:a:enalean:tuleap:16.1.99.50
-
cpe:2.3:a:enalean:tuleap:16.3