CVE-2025-30203

4.8 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Tuleap's RSS widget functionality. Project administrators or users controlling RSS feeds can inject malicious scripts that execute in victims' browsers when viewing RSS content. This affects Tuleap Community and Enterprise Editions before the patched versions.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: All versions before Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8
Operating Systems: All platforms running Tuleap
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RSS widget usage and attacker with project administrator privileges or control over RSS feed content

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with project administrator privileges or control over an RSS feed could execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, performing actions as the victim, or redirecting to malicious sites.

🟠

Likely Case

Project administrators or users with RSS feed control could perform limited XSS attacks against other project members viewing RSS widgets, potentially compromising their accounts within the Tuleap instance.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching victims' browsers.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires project administrator privileges or control over RSS feed content, limiting attack surface

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 16.5.99.1742562878, Tuleap Enterprise Edition 16.5-5 and 16.4-8

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance. 2. Update to patched version using your distribution's package manager. 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable RSS widgets

all

Remove or disable RSS widgets from all project dashboards to eliminate the attack vector

Restrict RSS feed sources

all

Only allow trusted, verified RSS feeds from internal sources

🧯 If You Can't Patch

  • Remove RSS widgets from all project dashboards immediately
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface admin panel or command line: /usr/share/tuleap/src/utils/php-launcher.sh /usr/share/tuleap/src/utils/display_tuleap_version.php

Check Version:

/usr/share/tuleap/src/utils/php-launcher.sh /usr/share/tuleap/src/utils/display_tuleap_version.php

Verify Fix Applied:

Verify version is at least Tuleap Community Edition 16.5.99.1742562878 or Enterprise Edition 16.5-5/16.4-8

📡 Detection & Monitoring

Log Indicators:

  • Unusual RSS feed modifications
  • Multiple failed XSS attempts in web logs

Network Indicators:

  • Suspicious JavaScript payloads in RSS content requests

SIEM Query:

web_logs WHERE (url CONTAINS 'rss' OR url CONTAINS 'widget') AND (payload CONTAINS '<script>' OR payload CONTAINS 'javascript:')

🔗 References

📤 Share & Export