We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a cross-site request forgery vulnerability in Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1749830289 and Tuleap Enterprise Edition 16.9-1 contain a patch for the issue.
Reserved 2025-06-13 | Published 2025-06-25 | Updated 2025-06-25 | Assigner GitHub_MCWE-352: Cross-Site Request Forgery (CSRF)
github.com/...tuleap/security/advisories/GHSA-rxpm-g7gw-4mrv
github.com/...ommit/0f9aab6e3640e892c74c9dfc90ad65fd3aff499e
tuleap.net/...mit&h=0f9aab6e3640e892c74c9dfc90ad65fd3aff499e
tuleap.net/plugins/tracker/?aid=43357
Support options