EUVD-2025-16577

| CVE-2025-40908 CRITICAL
2025-06-01 9b29abf9-4ab0-4765-b253-1875cd9b441e
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

5
Analysis Generated
Mar 14, 2026 - 16:42 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:42 euvd
EUVD-2025-16577
Patch Released
Mar 14, 2026 - 16:42 nvd
Patch available
PoC Detected
Jul 02, 2025 - 15:43 vuln.today
Public exploit code
CVE Published
Jun 01, 2025 - 14:15 nvd
CRITICAL 9.1

Description

YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified

Analysis

File modification via 2-args open in YAML-LibYAML before 0.903.0 for Perl. PoC and patch available.

Technical Context

CWE-552 via two-argument open().

Affected Products

['YAML-LibYAML < 0.903.0']

Remediation

Update.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: +20

Vendor Status

Ubuntu

Priority: Medium
libyaml-libyaml-perl
Release Status Version
xenial needs-triage -
bionic needs-triage -
focal needs-triage -
plucky not-affected 0.903.0+ds-1
upstream released 0.903.0+ds-1
oracular ignored end of life
jammy released 0.83+ds-1ubuntu0.22.04.1
noble released 0.89+ds-1ubuntu0.24.04.1
questing not-affected -

Debian

libyaml-libyaml-perl
Release Status Fixed Version Urgency
bullseye vulnerable 0.82+repack-1 -
bookworm fixed 0.86+ds-1+deb12u1 -
trixie fixed 0.903.0+ds-1 -
forky, sid fixed 0.904.0+ds-1 -
(unstable) fixed 0.903.0+ds-1 -

Share

EUVD-2025-16577 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy