CVE-2025-66422

NameCVE-2025-66422
DescriptionTryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4388-1, DSA-6064-1
Debian Bugs1121242

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tryton-server (PTS)bullseye5.0.33-2+deb11u2vulnerable
bullseye (security)5.0.33-2+deb11u4fixed
bookworm6.0.29-2+deb12u3vulnerable
bookworm (security)6.0.29-2+deb12u4fixed
trixie7.0.30-1vulnerable
trixie (security)7.0.30-1+deb13u1fixed
forky, sid7.0.40-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tryton-serversourcebullseye5.0.33-2+deb11u4DLA-4388-1
tryton-serversourcebookworm6.0.29-2+deb12u4DSA-6064-1
tryton-serversourcetrixie7.0.30-1+deb13u1DSA-6064-1
tryton-serversource(unstable)7.0.40-11121242

Notes

https://discuss.tryton.org/t/security-release-for-issue-14354/8950
https://foss.heptapod.net/tryton/tryton/-/issues/14354

Search for package or bug name: Reporting problems