CVE-2025-27099

4.8 MEDIUM

📋 TL;DR

This CVE describes a stored cross-site scripting (XSS) vulnerability in Tuleap's tracker semantic timeframe deletion messages. A tracker administrator can inject malicious scripts that execute in the context of other tracker administrators' browsers when they view deletion messages. This affects Tuleap instances with semantic timeframes shared across multiple trackers.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: All versions before Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires semantic timeframe functionality with trackers that share semantic timeframes. Only affects users with tracker administrator privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious tracker administrator could execute arbitrary JavaScript in other administrators' sessions, potentially stealing session cookies, performing actions as those users, or redirecting to malicious sites.

🟠

Likely Case

Attackers with tracker administrator privileges could perform limited session hijacking or defacement against other administrators within the same Tuleap instance.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tracker administrator privileges and knowledge of semantic timeframe usage patterns. The vulnerability is in the deletion message display mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 16.4.99.1740067916, Tuleap Enterprise Edition 16.4-5, Tuleap Enterprise Edition 16.3-10

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-vqfj-2gqp-g89x

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance and database. 2. Update to the patched version using your distribution's package manager or Tuleap upgrade process. 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict tracker administrator privileges

all

Limit tracker administrator roles to trusted users only and implement principle of least privilege

Disable semantic timeframe sharing

all

Prevent trackers from sharing semantic timeframes if not required for operations

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Monitor tracker administrator activities and audit semantic timeframe configurations

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version and compare against patched versions. Review if semantic timeframes are shared between trackers.

Check Version:

tuleap info | grep 'Tuleap version' or check Tuleap web interface administration panel

Verify Fix Applied:

Verify Tuleap version is at or above patched versions. Test that tracker names in semantic timeframe deletion messages are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual tracker name modifications
  • Multiple semantic timeframe deletion attempts
  • Administrator session anomalies

Network Indicators:

  • Unexpected JavaScript execution in tracker administration pages

SIEM Query:

source="tuleap" AND (event="tracker_update" OR event="semantic_timeframe_delete") AND user_role="tracker_admin"

🔗 References

📤 Share & Export