[Japanese]

JVNDB-2025-000075

Multiple vulnerabilities in TkEasyGUI

Overview

TkEasyGUI provided by kujirahand contains multiple vulnerabilities listed below.
  • OS command injection (CWE-78) - CVE-2025-55037
  • Uncontrolled search path element (CWE-427) - CVE-2025-55671

Satoki Tsuji of Ikotas Labs, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 9.8 (Critical) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
The above CVSS base scores have been assigned for CVE-2025-55037


CVSS V3 Severity:
Base Metrics:7.8 (High) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
The above CVSS base scores have been assigned for CVE-2025-55671
Affected Products


kujirahand
  • TkEasyGUI versions prior to v1.0.22

Impact

  • An arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources. (CVE-2025-55037)
  • Arbitrary code may be executed with the privilege of running the program. (CVE-2025-55671)
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.
Vendor Information

kujirahand
CWE (What is CWE?)

  1. OS Command Injection(CWE-78) [IPA Evaluation]
  2. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2025-55037
  2. CVE-2025-55671
References

  1. JVN : JVN#48739895
Revision History

  • [2025/09/05]
      Web page was published