CVE-2025-6705

Description

A vulnerability in the Eclipse Open VSX Registry’s automated publishing system could have allowed unauthorized uploads of extensions. Specifically, the system’s build scripts were executed without proper isolation, potentially exposing a privileged token. This token enabled the publishing of new extension versions under any namespace, including those not controlled by an attacker. However, it did not permit deletion of existing extensions, overwriting of published versions, or access to administrative features of the registry. The issue was reported on May 4, 2025, fully resolved by June 24, and followed by a comprehensive audit. No evidence of compromise was found, though 81 extensions were proactively deactivated as a precaution. The standard publishing process remained unaffected. Recommendations have been issued to mitigate similar risks in the future.

Category

7.6
CVSS
Severity: High
CVSS 4.0 •
EPSS 0.04%
Affected: Eclipse Foundation Eclipse Open VSX Registry
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-6705?
CVE-2025-6705 has been scored as a high severity vulnerability.
How to fix CVE-2025-6705?
To fix CVE-2025-6705, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-6705 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-6705 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-6705?
CVE-2025-6705 affects Eclipse Foundation Eclipse Open VSX Registry.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.