- Description
- YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
- Source
- 9b29abf9-4ab0-4765-b253-1875cd9b441e
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- 9b29abf9-4ab0-4765-b253-1875cd9b441e
- CWE-552
- Hype score
- Not currently trending
๐จ Critical #Gentoo Linux vulnerability (CVE-2025-40908) allows RCE via YAML-LibYAML! Patch now: emerge ">=dev-perl/YAML-LibYAML-0.903.0" Details: Read more: ๐ https://t.co/XTxrrpmU9L #InfoSec #CloudSecurity https://t.co/Zcf34TUATs
@Cezar_H_Linux
14 Jun 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ CVE-2025-40908: Perl YAML-LibYAML bug (CVSS 9.1) lets attackers modify files! Patch SUSE Linux 12 SP5 NOW: Read more: ๐https://t.co/OiT8nb48Fn #LinuxSecurity #CVE https://t.co/p22QGcgExw
@Cezar_H_Linux
12 Jun 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-40908 LibYAML Perl Module Vulnerability https://t.co/vTdwg9NXj6
@VulmonFeeds
1 Jun 2025
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-40908 YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified https://t.co/jecDEdO6px
@CVEnew
1 Jun 2025
822 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
High-severity vuln in Perl YAML-LibYAML <0.903.0 (CVE-2025-40908) lets attackers modify files! Patch now: https://t.co/ClsR2aPaxw #OffSeq #CVE202540908 #Perl #SecurityAlert #YAML https://t.co/yNypJHKJXj
@offseq
1 Jun 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ingydotnet:yaml-libyaml:*:*:*:*:*:perl:*:*",
"vulnerable": true,
"matchCriteriaId": "6F3A4FBC-0D8D-47B0-A8FB-07C0A1294A32",
"versionEndExcluding": "0.903.0"
}
],
"operator": "OR"
}
]
}
]