icon

We found results for “

CVE-2025-53513

Good to know:

icon

Date: July 8, 2025

The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

Path Traversal: '../filedir'

CWE-24

Top Fix

icon

Upgrade Version

Upgrade to version github.com/juju/juju - 2.9.52;github.com/juju/juju - 3.6.8;github.com/juju/juju - v0.0.0-20250619215741-6356e984b82a

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us