Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18300 | handcraftedinthealps/goodby-csv has Potential Gadget Chain allowing Remote Code Execution |
Github GHSA |
GHSA-x3c7-22c8-prg7 | handcraftedinthealps/goodby-csv has Potential Gadget Chain allowing Remote Code Execution |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 23 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | handcraftedinthealps goodby-csv is a highly memory efficient, flexible and extendable open-source CSV import/export library. Prior to 1.4.3, goodby-csv could be used as part of a chain of methods that is exploitable when an insecure deserialization vulnerability exists in an application. This so-called "gadget chain" presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability. The problem is patched with Version 1.4.3. | |
| Title | handcraftedinthealps goodby-csv Potential Gadget Chain allowing Remote Code Execution | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-23T16:08:07.251Z
Reserved: 2025-06-06T15:44:21.557Z
Link: CVE-2025-49597
Updated: 2025-06-23T16:08:02.989Z
Status : Deferred
Published: 2025-06-13T20:15:23.283
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-49597
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA