We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3114

Spotfire Code Execution Vulnerability



Description

Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.

Reserved 2025-04-02 | Published 2025-04-09 | Updated 2025-04-15 | Assigner tibco


CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Product status

Default status
unaffected

6
affected

Default status
unaffected

14
affected

14.1.0
affected

14.2.0
affected

14.3.0
affected

14.4.0
affected

14.4.1
affected

Default status
unknown

14
affected

14.1.0
affected

14.2.0
affected

14.3.0
affected

14.4.0
affected

14.4.1
affected

Default status
unknown

14
affected

14.1.0
affected

14.2.0
affected

14.3.0
affected

14.4.0
affected

14.4.1
affected

Default status
unaffected

14
affected

Default status
unknown

14
unknown

Default status
unknown

1
affected

1.18.0
affected

1.19.0
affected

1.20.0
affected

1.21.0
affected

1.21.1
affected

References

community.spotfire.com/...2025-spotfire-cve-2025-3114-r3484/

cve.org (CVE-2025-3114)

nvd.nist.gov (CVE-2025-3114)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3114

Support options

Helpdesk Chat, Email, Knowledgebase