CVE-2025-64499

4.6 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Tuleap's planning management API. Attackers can trick authenticated users into unknowingly creating, editing, or deleting project plans. All Tuleap Community Edition versions before 17.0.99.1762456922 and Enterprise Edition versions before 17.0-2, 16.13-7, and 16.12-10 are affected.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: Community Edition: < 17.0.99.1762456922; Enterprise Edition: < 17.0-2, < 16.13-7, < 16.12-10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations with affected versions are vulnerable. The vulnerability exists in the planning management API endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete or modify all project planning data, disrupting development workflows and potentially causing project delays or data loss.

🟠

Likely Case

Attackers modify planning data to disrupt specific projects, create confusion, or insert malicious content into project plans.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is minimal as attacks require user interaction and authentication.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and tricked into visiting a malicious page. Standard CSRF attack patterns apply.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Community Edition: 17.0.99.1762456922; Enterprise Edition: 17.0-2, 16.13-7, 16.12-10

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-9h47-jg7r-ww7x

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance. 2. Update to the patched version using your package manager (apt/yum). 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement CSRF Tokens Manually

all

Add CSRF protection to planning API endpoints if custom modifications are possible.

🧯 If You Can't Patch

  • Restrict access to Tuleap to trusted networks only
  • Educate users about phishing risks and CSRF attacks

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface or command line. If version matches affected range, system is vulnerable.

Check Version:

On Linux: dpkg -l | grep tuleap OR rpm -qa | grep tuleap

Verify Fix Applied:

Verify version is updated to patched version and test planning functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual planning modifications from unexpected IPs
  • Multiple planning changes in short timeframes

Network Indicators:

  • HTTP requests to planning API without proper referrer headers
  • CSRF-like attack patterns

SIEM Query:

Search for POST requests to /api/planning/* endpoints with suspicious referrers or user agents

🔗 References

📤 Share & Export