CVE-2025-3155

7.4 HIGH

📋 TL;DR

CVE-2025-3155 is a vulnerability in Yelp (the GNOME help application) that allows malicious help documents to execute arbitrary scripts. This could enable attackers to exfiltrate user files to external systems. Users of GNOME desktop environments with Yelp installed are affected.

💻 Affected Systems

Products:
  • Yelp (GNOME help viewer)
Versions: Versions prior to patched releases in Red Hat advisories
Operating Systems: Linux distributions with GNOME desktop (Red Hat, Fedora, Ubuntu, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Yelp is installed and users open help documents from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary code execution leading to data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local file exfiltration and limited system access through script execution in user context.

🟢

If Mitigated

No impact if Yelp is not used or properly restricted, or if malicious help documents are blocked.

🌐 Internet-Facing: LOW - This requires user interaction with malicious help documents, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious help documents, leading to data exfiltration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious help document. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific Red Hat advisories for version numbers

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:4450

Restart Required: No

Instructions:

1. Update Yelp package using system package manager. 2. For Red Hat systems: 'yum update yelp' or 'dnf update yelp'. 3. For other distributions, use appropriate package manager commands.

🔧 Temporary Workarounds

Disable Yelp or restrict help document sources

linux

Prevent Yelp from executing scripts or only allow trusted help document sources

sudo apt remove yelp
sudo yum remove yelp

User education and policy

all

Train users not to open help documents from untrusted sources

🧯 If You Can't Patch

  • Restrict Yelp execution through application control policies
  • Monitor for suspicious file access patterns from Yelp process

🔍 How to Verify

Check if Vulnerable:

Check Yelp version against patched versions in Red Hat advisories

Check Version:

yelp --version or rpm -q yelp or dpkg -l yelp

Verify Fix Applied:

Verify Yelp package version matches patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Yelp process
  • Network connections from Yelp to external systems

Network Indicators:

  • Outbound connections from Yelp process to unexpected destinations

SIEM Query:

process_name='yelp' AND (file_access_pattern='*' OR network_connection='*')

🔗 References

📤 Share & Export