-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2025-40908
PUBLISHED
More Info
Official Page
Assigner
-
CPANSec
Assigner Org ID
-
9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At
-
01 Jun, 2025 | 13:41
Updated At
-
02 Jun, 2025 | 03:22
Rejected At
-
▼
CVE Numbering Authority (CNA)
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
Affected Products
Vendor
TINITA
Product
YAML::LibYAML
Collection URL
https://cpan.org/modules
Package Name
YAML-LibYAML
Repo
https://github.com/ingydotnet/yaml-libyaml-pm
Program Files
lib/YAML/XS.pm
Default Status
unaffected
Versions
Affected
From
0
before
0.903.0
(custom)
Problem Types
Type
CWE ID
Description
CWE
CWE-552
CWE-552 Files or Directories Accessible to External Parties
Type:
CWE
CWE ID:
CWE-552
Description:
CWE-552 Files or Directories Accessible to External Parties
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
CAPEC-23
CAPEC-23 File Content Injection
CAPEC ID:
CAPEC-23
Description:
CAPEC-23 File Content Injection
Solutions
Configurations
Workarounds
Exploits
Credits
finder
@shlomif (Shlomi Fish)
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/ingydotnet/yaml-libyaml-pm/issues/120
issue-tracking
https://github.com/ingydotnet/yaml-libyaml-pm/pull/121
patch
https://github.com/ingydotnet/yaml-libyaml-pm/pull/122
patch
Hyperlink:
https://github.com/ingydotnet/yaml-libyaml-pm/issues/120
Resource:
issue-tracking
Hyperlink:
https://github.com/ingydotnet/yaml-libyaml-pm/pull/121
Resource:
patch
Hyperlink:
https://github.com/ingydotnet/yaml-libyaml-pm/pull/122
Resource:
patch
▼
Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
Version
Base score
Base severity
Vector
3.1
9.1
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Version:
3.1
Base score:
9.1
Base severity:
CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Details not found