Vulnerability Description
versionn, software for changing version information across multiple files, has a command injection vulnerability in all versions prior to version 1.1.0. This issue is patched in version 1.1.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Versionn Project | Versionn | < 1.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/commenthol/versionn/commit/2ca128823efe962b37f2698f0eb530c2b1Patch
- https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cmThird Party Advisory
- https://github.com/commenthol/versionn/commit/2ca128823efe962b37f2698f0eb530c2b1Patch
- https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cmThird Party Advisory
FAQ
What is CVE-2023-25805?
CVE-2023-25805 is a vulnerability with a CVSS score of 9.8 (CRITICAL). versionn, software for changing version information across multiple files, has a command injection vulnerability in all versions prior to version 1.1.0. This issue is patched in version 1.1.0.
How severe is CVE-2023-25805?
CVE-2023-25805 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-25805?
Check the references section above for vendor advisories and patch information. Affected products include: Versionn Project Versionn.