{ "schema_version": "1.4.0", "id": "GHSA-wc9m-r3v6-9p5h", "modified": "2025-02-04T23:18:58Z", "published": "2025-02-04T21:32:28Z", "aliases": [ "CVE-2025-0509" ], "summary": "Sparkle Signing Checks Bypass", "details": "A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "SwiftURL", "name": "github.com/sparkle-project/Sparkle" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.6.4" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 2.6.3" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0509" }, { "type": "WEB", "url": "https://github.com/sparkle-project/Sparkle/pull/2550" }, { "type": "PACKAGE", "url": "https://github.com/sparkle-project/Sparkle" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250124-0008" }, { "type": "WEB", "url": "https://sparkle-project.org/documentation/security-and-reliability" } ], "database_specific": { "cwe_ids": [ "CWE-552" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-02-04T23:18:58Z", "nvd_published_at": "2025-02-04T20:15:49Z" } }