CVE-2025-61873

LOW
2026-01-16 [email protected]
2.6
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Jan 16, 2026 - 19:16 nvd
LOW 2.6

Description

Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2 allows CSV Injection via ticket values when TSV export is used.

Analysis

Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2 allows CSV Injection via ticket values when TSV export is used. [CVSS 2.6 LOW]

Technical Context

This vulnerability (CWE-1236: Improper Neutralization of Formula Elements in a CSV File) Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2 allows CSV Injection via ticket values when TSV export is used.

Affected Products

Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2

Remediation

Monitor vendor advisories for a patch. Restrict network access to the affected service where possible.

Priority Score

13
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +13
POC: 0

Share

CVE-2025-61873 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy