CVE-2025-27401

4.6 MEDIUM

📋 TL;DR

This vulnerability in Tuleap allows authenticated users with access to any tracker to delete all criteria filters across all reports by repeatedly creating and deleting reports. This affects all Tuleap instances running vulnerable versions, potentially forcing administrators and users to recreate all filter configurations.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: All versions before Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with access to at least one tracker. Standard installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

All criteria filters across all reports are permanently deleted, requiring manual recreation and causing significant disruption to workflow and reporting capabilities.

🟠

Likely Case

Targeted deletion of specific filters or widespread filter loss requiring administrative intervention to restore functionality.

🟢

If Mitigated

Limited to data loss in specific trackers with minimal operational impact if backups are available.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is simple to execute through normal user interface actions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 16.4.99.1740498975, Tuleap Enterprise Edition 16.4-6, or 16.3-11

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance. 2. Update to patched version using your distribution's package manager. 3. Restart Tuleap services. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict Tracker Access

all

Limit tracker creation and deletion permissions to trusted administrators only.

Implement Rate Limiting

all

Configure web application firewall or reverse proxy to limit report creation/deletion requests per user.

🧯 If You Can't Patch

  • Implement strict access controls to limit tracker permissions to essential personnel only
  • Enable comprehensive logging and monitoring for report creation/deletion activities

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version against affected versions. If running vulnerable version and users have tracker access, instance is vulnerable.

Check Version:

tuleap info | grep 'Tuleap version' or check web interface administration panel

Verify Fix Applied:

Confirm version is patched (16.4.99.1740498975 or later for Community Edition, 16.4-6/16.3-11 or later for Enterprise Edition).

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid report creation and deletion events from single user
  • Unusual filter deletion patterns across multiple reports

Network Indicators:

  • High frequency of POST requests to report creation/deletion endpoints

SIEM Query:

source="tuleap" AND (event="report_created" OR event="report_deleted") | stats count by user | where count > threshold

🔗 References

📤 Share & Export