<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">icingacli-2.12.4-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:14931-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-03-26T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-03-26T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-03-26T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">icingacli-2.12.4-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the icingacli-2.12.4-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-14931</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-27404/</URL>
      <Description>SUSE CVE CVE-2025-27404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-27405/</URL>
      <Description>SUSE CVE CVE-2025-27405 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-27609/</URL>
      <Description>SUSE CVE CVE-2025-27609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-30164/</URL>
      <Description>SUSE CVE CVE-2025-30164 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icingacli-2.12.4-1.1">
      <FullProductName ProductID="icingacli-2.12.4-1.1">icingacli-2.12.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icingaweb2-2.12.4-1.1">
      <FullProductName ProductID="icingaweb2-2.12.4-1.1">icingaweb2-2.12.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icingaweb2-common-2.12.4-1.1">
      <FullProductName ProductID="icingaweb2-common-2.12.4-1.1">icingaweb2-common-2.12.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icingaweb2-php-fpm-2.12.4-1.1">
      <FullProductName ProductID="icingaweb2-php-fpm-2.12.4-1.1">icingaweb2-php-fpm-2.12.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php-icinga-2.12.4-1.1">
      <FullProductName ProductID="php-icinga-2.12.4-1.1">php-icinga-2.12.4-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="icingacli-2.12.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icingacli-2.12.4-1.1">icingacli-2.12.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icingaweb2-2.12.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icingaweb2-2.12.4-1.1">icingaweb2-2.12.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icingaweb2-common-2.12.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icingaweb2-common-2.12.4-1.1">icingaweb2-common-2.12.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="icingaweb2-php-fpm-2.12.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:icingaweb2-php-fpm-2.12.4-1.1">icingaweb2-php-fpm-2.12.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php-icinga-2.12.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php-icinga-2.12.4-1.1">php-icinga-2.12.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings.</Note>
    </Notes>
    <CVE>CVE-2025-27404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icingacli-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-common-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-php-fpm-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php-icinga-2.12.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-27404.html</URL>
        <Description>CVE-2025-27404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240145</URL>
        <Description>SUSE Bug 1240145</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings.</Note>
    </Notes>
    <CVE>CVE-2025-27405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icingacli-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-common-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-php-fpm-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php-icinga-2.12.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-27405.html</URL>
        <Description>CVE-2025-27405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240146</URL>
        <Description>SUSE Bug 1240146</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a request that, once transmitted to a victim's Icinga Web, allows to embed arbitrary Javascript into it and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings. Any modern browser with a working CORS implementation also sufficiently guards against the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-27609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icingacli-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-common-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-php-fpm-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php-icinga-2.12.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-27609.html</URL>
        <Description>CVE-2025-27609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240148</URL>
        <Description>SUSE Bug 1240148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 vulnerability allows an attacker to craft a URL that, once visited by an authenticated user (or one that is able to authenticate), allows to manipulate the backend to redirect the user to any location. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. No known workarounds are available.</Note>
    </Notes>
    <CVE>CVE-2025-30164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:icingacli-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-common-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:icingaweb2-php-fpm-2.12.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php-icinga-2.12.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-30164.html</URL>
        <Description>CVE-2025-30164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240149</URL>
        <Description>SUSE Bug 1240149</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
