CVE-2025-29766

4.6 MEDIUM

📋 TL;DR

CVE-2025-29766 is a Cross-Site Request Forgery (CSRF) vulnerability in Tuleap that allows attackers to trick authenticated users into submitting or editing tracker artifacts and comments without their consent. This affects all Tuleap users with artifact submission/edit permissions. The vulnerability exists due to missing CSRF protections in tracker views.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: All versions before Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8
Operating Systems: All platforms running Tuleap
Default Config Vulnerable: ⚠️ Yes
Notes: All Tuleap installations with tracker functionality enabled are affected. The vulnerability requires an authenticated user with artifact submission/edit permissions to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate artifact data, create malicious artifacts, or modify existing artifacts to disrupt project management, inject malicious content, or alter project tracking data.

🟠

Likely Case

Unauthorized artifact modifications or submissions leading to data integrity issues, project confusion, or minor disruption of development workflows.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is minimal as legitimate requests would be validated and users would be alerted to suspicious activity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into visiting malicious pages. The technical complexity of creating CSRF payloads is low.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 16.5.99.1741784483, Tuleap Enterprise Edition 16.5-3, and Tuleap Enterprise Edition 16.4-8

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-6p9q-p2q4-3rqx

Restart Required: Yes

Instructions:

1. Backup your Tuleap installation and database. 2. Update to the patched version using your distribution's package manager or Tuleap upgrade process. 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement CSRF tokens manually

all

Add CSRF protection to tracker artifact submission and edit endpoints

Not applicable - requires code modification

Use SameSite cookie attribute

all

Configure session cookies with SameSite=Strict or SameSite=Lax to reduce CSRF risk

Modify Tuleap configuration to set session.cookie_samesite = 'Strict' in php.ini or Tuleap config

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate users about CSRF risks and safe browsing practices, especially regarding clicking unknown links

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version and compare against patched versions. Review tracker endpoints for CSRF token validation.

Check Version:

tuleap version (or check /etc/tuleap/VERSION file)

Verify Fix Applied:

Verify Tuleap version is at or above patched versions. Test artifact submission/edit forms to confirm CSRF tokens are required.

📡 Detection & Monitoring

Log Indicators:

  • Multiple artifact submissions from same user in short timeframe
  • Artifact edits without corresponding user interface interactions

Network Indicators:

  • POST requests to tracker endpoints without Referer headers or CSRF tokens
  • Requests from unexpected sources to artifact submission endpoints

SIEM Query:

source="tuleap" AND (url_path="/plugins/tracker/" AND method="POST") AND NOT (referer CONTAINS "tuleap")

🔗 References

📤 Share & Export