CVE-2025-66422

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*

History

04 Dec 2025, 17:11

Type Values Removed Values Added
CPE cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*
First Time Tryton
Tryton trytond
References () https://discuss.tryton.org/t/security-release-for-issue-14354/8950 - () https://discuss.tryton.org/t/security-release-for-issue-14354/8950 - Vendor Advisory
References () https://foss.heptapod.net/tryton/tryton/-/issues/14354 - () https://foss.heptapod.net/tryton/tryton/-/issues/14354 - Exploit, Issue Tracking

30 Nov 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-30 03:15

Updated : 2025-12-04 17:11


NVD link : CVE-2025-66422

Mitre link : CVE-2025-66422

CVE.ORG link : CVE-2025-66422


JSON object : View

Products Affected

tryton

  • trytond
CWE
CWE-402

Transmission of Private Resources into a New Sphere ('Resource Leak')