Vulnerability Description
Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, any authenticated user, machine or controller under a Juju controller can modify the resources of an application within the entire controller. This issue has been patched in versions 2.9.56 and 3.6.19.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Juju | >= 2.9, <= 2.9.55 |
Related Weaknesses (CWE)
References
- https://github.com/juju/juju/commit/26ff93c903d55b0712c6fb3f6b254710edb971d4Patch
- https://github.com/juju/juju/security/advisories/GHSA-245v-p8fj-vwm2Vendor Advisory
FAQ
What is CVE-2025-68153?
CVE-2025-68153 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before...
How severe is CVE-2025-68153?
CVE-2025-68153 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68153?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Juju.