CVE-2025-27150
Severity CVSS v4.0:
Pending analysis
Type:
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
Publication date:
04/03/2025
Last modified:
22/08/2025
Description
Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* | 16.3-11 (excluding) | |
| cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:* | 16.4.99.1740492866 (excluding) | |
| cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* | 16.4 (including) | 16.4-6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



