Home

Description

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.

PUBLISHED Reserved 2025-11-30 | Published 2025-11-30 | Updated 2025-11-30 | Assigner mitre




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak')

Product status

Default status
unaffected

Any version before 6.0.70
affected

7.0.0 (semver) before 7.0.40
affected

7.1.0 (semver) before 7.4.21
affected

7.5.0 (semver) before 7.6.11
affected

References

discuss.tryton.org/t/security-release-for-issue-14354/8950

foss.heptapod.net/tryton/tryton/-/issues/14354

cve.org (CVE-2025-66422)

nvd.nist.gov (CVE-2025-66422)

Download JSON