Published:2025/09/05  Last Updated:2025/09/05

JVN#48739895
Multiple vulnerabilities in TkEasyGUI

Overview

TkEasyGUI provided by kujirahand contains multiple vulnerabilities.

Products Affected

  • TkEasyGUI versions prior to v1.0.22

Description

TkEasyGUI provided by kujirahand contains multiple vulnerabilities listed below.

  • OS command injection (CWE-78)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-55037
  • Uncontrolled search path element(CWE-427
    • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.5
    • CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2025-55671

Impact

  • An arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources. (CVE-2025-55037)
  • Arbitrary code may be executed with the privilege of running the program. (CVE-2025-55671)

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Satoki Tsuji of Ikotas Labs, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-55037
CVE-2025-55671
JVN iPedia JVNDB-2025-000075