Tanzu RabbitMQ Security Advisory CVE-2025-30219 - TNZ-2025-0022

VMware Tanzu RabbitMQ

0 more products

25663

28 April 2025

28 April 2025

CLOSED

MEDIUM

6.1

CVE-2025-30219

Individual Advisory

Advisory ID:

TNZ-2025-0022

Severity:

Medium

CVSSv3 Range:

4.0-6.9

CVSSv3 Vector:

6.1

Issue Date:

2025-04-28 

Updated on:

2025-04-28

CVE(s)

CVE-2025-30219

Synopsis

Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue.

Product Versions Affected

  • OSS RabbitMQ 4.0.3
  • Tanzu RabbitMQ 4.0.3 & LTS OSS RabbitMQ 3.13.8

Upstream OSS Advisory Link:

https://nvd.nist.gov/vuln/detail/CVE-2025-30219

https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-g58g-82mw-9m3p

Other Products Versions Affected

  • None

Mitigation

Users of affected versions should apply the following mitigation or upgrade:

  • Users are advised to disable the management plugin and use Prometheus and Grafana for monitoring

History

2025-04-28: Initial vulnerability report published.

Contact

E-mail: [email protected]

VMware Tanzu Security Advisories
https://tanzu.vmware.com/security