Published:2025/09/05 Last Updated:2025/09/05
JVN#48739895
Multiple vulnerabilities in TkEasyGUI
Overview
TkEasyGUI provided by kujirahand contains multiple vulnerabilities.
Products Affected
- TkEasyGUI versions prior to v1.0.22
Description
TkEasyGUI provided by kujirahand contains multiple vulnerabilities listed below.
- OS command injection (CWE-78)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
- CVE-2025-55037
- Uncontrolled search path element(CWE-427)
- CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.5
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score 7.8
- CVE-2025-55671
Impact
- An arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources. (CVE-2025-55037)
- Arbitrary code may be executed with the privilege of running the program. (CVE-2025-55671)
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
kujirahand | Release v1.0.22 · kujirahand/tkeasygui-python · GitHub |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Satoki Tsuji of Ikotas Labs, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2025-55037 |
CVE-2025-55671 |
|
JVN iPedia |
JVNDB-2025-000075 |