Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-20665 | Juju allows arbitrary executable uploads via authenticated endpoint without authorization |
Github GHSA |
GHSA-4vc8-wvhw-m5gv | Juju allows arbitrary executable uploads via authenticated endpoint without authorization |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Aug 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution. | |
| Title | Arbitrary executable upload via authenticated endpoint | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-07-08T17:36:20.075Z
Reserved: 2025-01-31T10:43:45.458Z
Link: CVE-2025-0928
Updated: 2025-07-08T17:35:34.900Z
Status : Analyzed
Published: 2025-07-08T18:15:26.767
Modified: 2025-08-26T17:54:53.650
Link: CVE-2025-0928
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:47:02Z
EUVD
Github GHSA