We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6705



Description

A vulnerability in the Eclipse Open VSX Registry’s automated publishing system could have allowed unauthorized uploads of extensions. Specifically, the system’s build scripts were executed without proper isolation, potentially exposing a privileged token. This token enabled the publishing of new extension versions under any namespace, including those not controlled by an attacker. However, it did not permit deletion of existing extensions, overwriting of published versions, or access to administrative features of the registry. The issue was reported on May 4, 2025, fully resolved by June 24, and followed by a comprehensive audit. No evidence of compromise was found, though 81 extensions were proactively deactivated as a precaution. The standard publishing process remained unaffected. Recommendations have been issued to mitigate similar risks in the future.

Reserved 2025-06-26 | Published 2025-06-27 | Updated 2025-07-02 | Assigner eclipse


HIGH: 7.6CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-913 Improper Control of Dynamically-Managed Code Resources

CWE-653 Improper Isolation or Compartmentalization

Product status

Default status
unaffected

date < 20250624
affected

Credits

Oren Yomtov (Koi Security) reporter

References

open-vsx.org product

github.com/EclipseFdn/publish-extensions/pull/881 patch

cve.org (CVE-2025-6705)

nvd.nist.gov (CVE-2025-6705)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6705

Support options

Helpdesk Chat, Email, Knowledgebase