CVE-2025-9868 (GCVE-0-2025-9868)
Vulnerability from cvelistv5 – Published: 2025-10-08 17:07 – Updated: 2025-10-08 17:23
VLAI?
Summary
Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests.
Severity ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Sonatype | Nexus Repository |
Affected:
2.0.0 , ≤ 2.15.2
(semver)
cpe:2.3:a:sonatype:nexus_repository_manager:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.5:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.0.6:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.6.3:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.6.4:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.7.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.9.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.9.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.9.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.10.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.11.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.11.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.11.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.11.3:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.11.4:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.12.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.12.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.13.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.2:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.3:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.4:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.5:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.6:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.7:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.8:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.9:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.10:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.11:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.12:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.13:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.14:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.15:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.16:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.17:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.18:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.19:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.20:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.14.21:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.15.0:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.15.1:*:*:*:*:*:*:* cpe:2.3:a:sonatype:nexus_repository_manager:2.15.2:*:*:*:*:*:*:* |
Credits
Michael Stepankin at GitHub Security Lab
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9868",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-08T17:23:28.489309Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-08T17:23:36.055Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.13:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.14:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.15:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.18:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.19:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.21:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.2:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Nexus Repository",
"vendor": "Sonatype",
"versions": [
{
"lessThanOrEqual": "2.15.2",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Stepankin at GitHub Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests."
}
],
"value": "Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-08T17:07:45.543Z",
"orgId": "103e4ec9-0a87-450b-af77-479448ddef11",
"shortName": "Sonatype"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.sonatype.com/hc/en-us/articles/45363201583635"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Nexus Repository 2 - SSRF Vulnerability in Remote Browser Plugin",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11",
"assignerShortName": "Sonatype",
"cveId": "CVE-2025-9868",
"datePublished": "2025-10-08T17:07:45.543Z",
"dateReserved": "2025-09-02T19:35:28.000Z",
"dateUpdated": "2025-10-08T17:23:36.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-9868\",\"sourceIdentifier\":\"103e4ec9-0a87-450b-af77-479448ddef11\",\"published\":\"2025-10-08T18:15:35.760\",\"lastModified\":\"2025-10-08T19:38:09.863\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"103e4ec9-0a87-450b-af77-479448ddef11\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"103e4ec9-0a87-450b-af77-479448ddef11\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"references\":[{\"url\":\"https://support.sonatype.com/hc/en-us/articles/45363201583635\",\"source\":\"103e4ec9-0a87-450b-af77-479448ddef11\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-9868\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-08T17:23:28.489309Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-08T17:23:31.276Z\"}}], \"cna\": {\"title\": \"Nexus Repository 2 - SSRF Vulnerability in Remote Browser Plugin\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Michael Stepankin at GitHub Security Lab\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.1.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.3.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.3.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.5.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.5.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.6.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.7.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.8.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.8.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.9.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.10.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.11.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.12.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.12.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.13.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.14.21:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:sonatype:nexus_repository_manager:2.15.2:*:*:*:*:*:*:*\"], \"vendor\": \"Sonatype\", \"product\": \"Nexus Repository\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.15.2\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.sonatype.com/hc/en-us/articles/45363201583635\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Server-Side Request Forgery (SSRF) in the Remote Browser Plugin in Sonatype Nexus Repository 2.x up to and including 2.15.2 allows unauthenticated remote attackers to exfiltrate proxy repository credentials via crafted HTTP requests.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918 Server-Side Request Forgery (SSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"103e4ec9-0a87-450b-af77-479448ddef11\", \"shortName\": \"Sonatype\", \"dateUpdated\": \"2025-10-08T17:07:45.543Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-9868\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-08T17:23:36.055Z\", \"dateReserved\": \"2025-09-02T19:35:28.000Z\", \"assignerOrgId\": \"103e4ec9-0a87-450b-af77-479448ddef11\", \"datePublished\": \"2025-10-08T17:07:45.543Z\", \"assignerShortName\": \"Sonatype\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…