Vulnerability Details CVE-2025-3155
A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.4%
CVSS Severity
CVSS v3 Score 7.4
Products affected by CVE-2025-3155
-
cpe:2.3:a:gnome:yelp:42.2-8
-
cpe:2.3:a:redhat:codeready_linux_builder:8.0
-
cpe:2.3:a:redhat:codeready_linux_builder:9.0
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:8.0_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.8_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.6_aarch64
-
cpe:2.3:a:redhat:codeready_linux_builder_for_eus:8.8
-
cpe:2.3:a:redhat:codeready_linux_builder_for_eus:9.2
-
cpe:2.3:a:redhat:codeready_linux_builder_for_eus:9.4
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.8_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.6_s390x
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0_ppc64le
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.8_ppc64le
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le
-
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.6_ppc64le
-
cpe:2.3:o:debian:debian_linux:11.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux:9.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:9.2
-
cpe:2.3:o:redhat:enterprise_linux_eus:9.4
-
cpe:2.3:o:redhat:enterprise_linux_eus:9.6
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64
-
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.2
-
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4