Tanzu RabbitMQ Security Advisory CVE-2025-30219 - TNZ-2025-0022
25663
28 April 2025
28 April 2025
CLOSED
MEDIUM
6.1
CVE-2025-30219
Individual Advisory
Advisory ID: |
TNZ-2025-0022 |
Severity: |
Medium |
CVSSv3 Range: |
4.0-6.9 |
CVSSv3 Vector: |
6.1 |
Issue Date: |
2025-04-28 |
Updated on: |
2025-04-28 |
CVE(s) |
CVE-2025-30219 |
Synopsis |
Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue. |
Product Versions Affected
- OSS RabbitMQ 4.0.3
- Tanzu RabbitMQ 4.0.3 & LTS OSS RabbitMQ 3.13.8
Upstream OSS Advisory Link:
https://nvd.nist.gov/vuln/detail/CVE-2025-30219
https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-g58g-82mw-9m3p
Other Products Versions Affected
- None
Mitigation
Users of affected versions should apply the following mitigation or upgrade:
- Users are advised to disable the management plugin and use Prometheus and Grafana for monitoring
History
2025-04-28: Initial vulnerability report published.
Contact
E-mail: [email protected]
VMware Tanzu Security Advisories
https://tanzu.vmware.com/security