[Japanese]
|
JVNDB-2025-000075
|
Multiple vulnerabilities in TkEasyGUI
|
TkEasyGUI provided by kujirahand contains multiple vulnerabilities listed below.- OS command injection (CWE-78) - CVE-2025-55037
- Uncontrolled search path element (CWE-427) - CVE-2025-55671
Satoki Tsuji of Ikotas Labs, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2025-55037
|
CVSS V3 Severity:
Base Metrics:7.8 (High) [IPA Score]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2025-55671
|
|
kujirahand
- TkEasyGUI versions prior to v1.0.22
|
|
- An arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources. (CVE-2025-55037)
- Arbitrary code may be executed with the privilege of running the program. (CVE-2025-55671)
|
[Update the software]
Update the software to the latest version according to the information provided by the developer.
|
kujirahand
|
- OS Command Injection(CWE-78) [IPA Evaluation]
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2025-55037
- CVE-2025-55671
|
- JVN : JVN#48739895
|
- [2025/09/05]
Web page was published
|