Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Tue, 04 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the ciwweb.pl http://ciwweb.pl/ Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands. | |
| Title | Sawtooth Software Lighthouse Studio < 9.16.14 Pre-Authentication RCE | |
| Weaknesses | CWE-1336 CWE-20 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:15:42.438Z
Reserved: 2025-04-15T19:15:22.582Z
Link: CVE-2025-34300
Updated: 2025-07-16T14:27:24.292Z
Status : Deferred
Published: 2025-07-16T13:15:23.823
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34300
No data.
OpenCVE Enrichment
No data.