2025-06-01
9b29abf9-4ab0-4765-b253-1875cd9b441e
9.1
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Lifecycle Timeline
5
Analysis Generated
Mar 14, 2026 - 16:42 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:42 euvd
EUVD-2025-16577
Patch Released
Mar 14, 2026 - 16:42 nvd
Patch available
PoC Detected
Jul 02, 2025 - 15:43 vuln.today
Public exploit code
CVE Published
Jun 01, 2025 - 14:15 nvd
CRITICAL 9.1
Description
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
Analysis
File modification via 2-args open in YAML-LibYAML before 0.903.0 for Perl. PoC and patch available.
Technical Context
CWE-552 via two-argument open().
Affected Products
['YAML-LibYAML < 0.903.0']
Remediation
Update.
Priority Score
66
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: +20
Vendor Status
Ubuntu
Priority: Mediumlibyaml-libyaml-perl
| Release | Status | Version |
|---|---|---|
| xenial | needs-triage | - |
| bionic | needs-triage | - |
| focal | needs-triage | - |
| plucky | not-affected | 0.903.0+ds-1 |
| upstream | released | 0.903.0+ds-1 |
| oracular | ignored | end of life |
| jammy | released | 0.83+ds-1ubuntu0.22.04.1 |
| noble | released | 0.89+ds-1ubuntu0.24.04.1 |
| questing | not-affected | - |
Debian
libyaml-libyaml-perl
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 0.82+repack-1 | - |
| bookworm | fixed | 0.86+ds-1+deb12u1 | - |
| trixie | fixed | 0.903.0+ds-1 | - |
| forky, sid | fixed | 0.904.0+ds-1 | - |
| (unstable) | fixed | 0.903.0+ds-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-16577