Skip to content

Commit d67b496

Browse files
brianm-jfrogsrmish-jfrog
authored andcommitted
Malicious packages 260128
1 parent c50dbdd commit d67b496

2 files changed

Lines changed: 10 additions & 4 deletions

File tree

post/potential-rce-vulnerabilityin-openssl-cve-2025-15467.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ minutes: '5'
1010

1111
---
1212

13-
# Potentially Critical RCE Vulnerability in OpenSSL \- CVE-2025-15467
14-
1513
![](/img/RealTimePostImage/post/openssl/image1.png)
1614
The JFrog Security Research team is tracking a newly disclosed OpenSSL vulnerability, CVE-2025-15467, a stack overflow issue that may lead to remote code execution (RCE). While no official CVSS score has been assigned yet, it was rated with a “high” severity by OpenSSL and based on its characteristics, we assess that it may be rated as Critical by NVD.
1715

@@ -31,13 +29,13 @@ FIPS modules in 3.6, 3.5, 3.4, 3.3, and 3.0 are not affected, as the CMS impleme
3129
**Our research team has managed to reproduce the vulnerability** by calling the [**CMS\_Decrypt**](https://docs.openssl.org/3.2/man3/CMS_decrypt/) API directly, which means that OpenSSL applications that directly call this API are vulnerable to CVE-2025-15467.
3230
![](/img/RealTimePostImage/post/openssl/image2.png)
3331

34-
Another possible exploit can be achieved by executing the openssl CLI like that:
32+
Exploitation can also be achieved when applications are using the `openssl cms` CLI tool to decrypt untrusted data:
3533

3634
```shell
3735
openssl cms -decrypt -in untrusted_data.pem
3836
```
3937

40-
However \- this is only an initial assessment and more attack vectors are likely to be relevant, stay tuned as we update this blog.
38+
Note that this is only an initial assessment and more attack vectors are likely to be relevant, stay tuned as we update this blog.
4139

4240
## How to resolve CVE-2025-15467?
4341

src/malicious/malicious-data.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,12 @@
11
[
2+
{
3+
"title": "chai-as-executed",
4+
"description": "",
5+
"date_published": "2026-01-19",
6+
"platform": "npm",
7+
"downloads_text": "<1k total downloads",
8+
"type": "malicious"
9+
},
210
{
311
"title": "cugraph-service-server",
412
"description": "",

0 commit comments

Comments
 (0)