CVE-2025-3114Code Injection in Deployment KIT Used IN Spotfire Server

Severity
9.4CRITICALNVD
EPSS
0.6%
top 31.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages6 packages

🔴Vulnerability Details

2
GHSA
GHSA-v6v7-m3w9-36g8: Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validat2025-04-09
CVEList
Spotfire Code Execution Vulnerability2025-04-09

📋Vendor Advisories

2
Microsoft
An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference2022-12-13
Microsoft
In Go before 1.14.14 and 1.15.x before 1.15.7 crypto/elliptic/p224.go can generate incorrect outputs related to an underflow of the lowest limb during the final complete reduction in the P-224 field.2021-01-12
CVE-2025-3114 — Code Injection | cvebase