Home

Description

The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-13 | Updated 2025-12-13 | Assigner JFROG




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-501 Trust Boundary Violation

Product status

Any version before 1.1.0
affected

References

research.jfrog.com/...command-execution-jfsa-2025-001648329/ third-party-advisory

github.com/...ommit/2dc9c02df72cad3770c934959325ec344b441444 patch

cve.org (CVE-2025-14542)

nvd.nist.gov (CVE-2025-14542)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.