Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-13947

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-03 Dec, 2025 | 09:45
Updated At-07 Jan, 2026 | 15:17
Rejected At-
Credits

Webkit: webkitgtk: remote user-assisted information disclosure via file drag-and-drop

A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:03 Dec, 2025 | 09:45
Updated At:07 Jan, 2026 | 15:17
Rejected At:
â–¼CVE Numbering Authority (CNA)
Webkit: webkitgtk: remote user-assisted information disclosure via file drag-and-drop

A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.

Affected Products
Vendor
The WebKitGTK Team
Product
webkitgtk
Collection URL
https://github.com/WebKit/WebKit
Package Name
webkitgtk
Default Status
unaffected
Versions
Affected
  • From 0 before 2.50.3 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7 Extended Lifecycle Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkitgtk4
CPEs
  • cpe:/o:redhat:rhel_els:7
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el7_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el8_10 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Advanced Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/a:redhat:rhel_tus:8.6::appstream
  • cpe:/a:redhat:rhel_aus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_tus:8.8::appstream
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_tus:8.8::appstream
  • cpe:/a:redhat:rhel_e4s:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-2.el8_8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el9_7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_e4s:9.0::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el9_0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_e4s:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el9_2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.4 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_eus:9.4::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el9_4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.6 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkit2gtk3
CPEs
  • cpe:/a:redhat:rhel_eus:9.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.50.3-1.el9_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkitgtk
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
webkitgtk3
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
affected
Metrics
VersionBase scoreBase severityVector
3.17.4HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Metrics Other Info
Red Hat severity rating
value:
Important
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Exploits

Credits

Red Hat would like to thank Janet Black for reporting this issue.
Timeline
EventDate
Reported to Red Hat.2025-12-03 08:57:27
Made public.2025-12-03 00:00:00
Event: Reported to Red Hat.
Date: 2025-12-03 08:57:27
Event: Made public.
Date: 2025-12-03 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:22789
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:22790
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23110
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23433
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23434
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23451
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23452
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23583
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23591
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23742
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:23743
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2025-13947
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2418576
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22789
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22790
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23110
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23433
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23434
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23451
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23452
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23583
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23591
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23742
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23743
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-13947
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2418576
Resource:
issue-tracking
x_refsource_REDHAT
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-346CWE-346 Origin Validation Error
Type: CWE
CWE ID: CWE-346
Description: CWE-346 Origin Validation Error
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:03 Dec, 2025 | 10:15
Updated At:07 Jan, 2026 | 16:15

A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.4HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-346Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-346
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:22789secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22790secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23110secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23433secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23434secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23451secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23452secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23583secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23591secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23742secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23743secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2025-13947secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2418576secalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22789
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22790
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23110
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23433
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23434
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23451
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23452
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23583
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23591
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23742
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23743
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-13947
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2418576
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

6Records found

CVE-2025-3155
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.67% / 70.91%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 13:34
Updated-11 Nov, 2025 | 12:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Yelp: arbitrary file read

A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.

Action-Not Available
Vendor-Red Hat, Inc.Debian GNU/LinuxThe GNOME Project
Product-enterprise_linux_for_ibm_z_systems_eusdebian_linuxcodeready_linux_builder_for_power_little_endian_euscodeready_linux_builderenterprise_linux_server_tusenterprise_linux_server_ausenterprise_linux_update_services_for_sap_solutionscodeready_linux_builder_for_arm64codeready_linux_builder_for_power_little_endianyelpcodeready_linux_builder_for_ibm_z_systems_euscodeready_linux_builder_for_eusenterprise_linux_for_power_little_endian_euscodeready_linux_builder_for_arm64_eusenterprise_linux_for_arm_64codeready_linux_builder_for_ibm_z_systemsenterprise_linux_for_ibm_z_systemsenterprise_linux_for_power_little_endianenterprise_linuxenterprise_linux_for_arm_64_eusenterprise_linux_eusRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 6Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-7365
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.28%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 14:20
Updated-08 Jan, 2026 | 04:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: phishing attack via email verification step in first login flow

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.

Action-Not Available
Vendor-Red Hat, Inc.
Product-keycloakRed Hat build of Keycloak 26Red Hat build of Keycloak 26.2Red Hat build of Keycloak 26.0
CWE ID-CWE-346
Origin Validation Error
CVE-2024-2182
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 61.56%
||
7 Day CHG-0.01%
Published-12 Mar, 2024 | 16:18
Updated-08 Nov, 2025 | 07:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ovn: insufficient validation of bfd packets may lead to denial of service

A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Fast Datapath for RHEL 8Fast Datapath for RHEL 9Fast Datapath for RHEL 7Fast Datapath for Red Hat Enterprise Linux 8Fast Datapath for Red Hat Enterprise Linux 9
CWE ID-CWE-346
Origin Validation Error
CVE-2024-1249
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.18% / 38.94%
||
7 Day CHG+0.04%
Published-17 Apr, 2024 | 13:22
Updated-20 Feb, 2026 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Decision Manager 7Red Hat AMQ Broker 7Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 7Red Hat Data Grid 8streams for Apache KafkaRed Hat Single Sign-On 7.6 for RHEL 9Red Hat Developer HubRed Hat build of Apicurio Registry 2Red Hat Single Sign-On 7.6 for RHEL 8Red Hat build of Keycloak 22.0.10RHSSO 7.6.8Red Hat JBoss Enterprise Application Platform 6Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat build of Keycloak 22RHOSS-1.33-RHEL-8Migration Toolkit for Applications 7Migration Toolkit for Applications 6Red Hat JBoss Enterprise Application Platform 7RHEL-8 based Middleware ContainersRed Hat Fuse 7Red Hat JBoss Data Grid 7Red Hat Process Automation 7
CWE ID-CWE-346
Origin Validation Error
CVE-2023-40547
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.3||HIGH
EPSS-4.17% / 88.46%
||
7 Day CHG~0.00%
Published-25 Jan, 2024 | 15:54
Updated-20 Nov, 2025 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shim: rce in http boot support may lead to secure boot bypass

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

Action-Not Available
Vendor-Red Hat, Inc.
Product-shimenterprise_linuxRed Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.2 Telecommunications Update ServiceRed Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 9.0 Extended Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRed Hat Enterprise Linux 8
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-346
Origin Validation Error
CVE-2026-27579
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-Not Assigned
Published-21 Feb, 2026 | 10:22
Updated-21 Feb, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CollabPlatform : CORS Misconfiguration Allows Arbitrary Origin With Credentials Leading to Authenticated Account Data Exposure

CollabPlatform is a full-stack, real-time doc collaboration platform. In all versions of CollabPlatform, the Appwrite project used by the application is misconfigured to allow arbitrary origins in CORS responses while also permitting credentialed requests. An attacker-controlled domain can issue authenticated cross-origin requests and read sensitive user account information, including email address, account identifiers, and MFA status. The issue did not have a fix at the time of publication.

Action-Not Available
Vendor-karnop
Product-realtime-collaboration-platform
CWE ID-CWE-346
Origin Validation Error
CWE ID-CWE-942
Permissive Cross-domain Policy with Untrusted Domains
Details not found