framasoft CVE Vulnerabilities & Metrics

Focus on framasoft vulnerabilities and metrics.

Last updated: 26 Nov 2025, 23:25 UTC

About framasoft Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with framasoft. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total framasoft CVEs: 16
Earliest CVE date: 17 Jul 2017, 13:18 UTC
Latest CVE date: 15 Apr 2025, 15:16 UTC

Latest CVE reference: CVE-2025-32949

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 7

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical framasoft CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.86

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 8
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS framasoft CVEs

These are the five CVEs with the highest CVSS scores for framasoft, sorted by severity first and recency.

All CVEs for framasoft

CVE-2025-32949 framasoft vulnerability CVSS: 0 15 Apr 2025, 15:16 UTC

This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.

CVE-2025-32948 framasoft vulnerability CVSS: 0 15 Apr 2025, 15:16 UTC

The vulnerability allows any attacker to cause the PeerTube server to stop functioning, or in special cases send requests to arbitrary URLs (Blind SSRF). Attackers can send ActivityPub activities to PeerTube's "inbox" endpoint. By abusing the "Create Activity" functionality, it is possible to create crafted playlists which will cause either denial of service or an attacker-controlled blind SSRF.

CVE-2025-32947 framasoft vulnerability CVSS: 0 15 Apr 2025, 15:16 UTC

This vulnerability allows any attacker to cause the PeerTube server to stop responding to requests due to an infinite loop in the "inbox" endpoint when receiving crafted ActivityPub activities.

CVE-2025-32946 framasoft vulnerability CVSS: 0 15 Apr 2025, 13:15 UTC

This vulnerability allows any attacker to add playlists to a different user’s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user.

CVE-2025-32945 framasoft vulnerability CVSS: 0 15 Apr 2025, 13:15 UTC

The vulnerability allows an existing user to add playlists to a different user’s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user.

CVE-2025-32944 framasoft vulnerability CVSS: 0 15 Apr 2025, 13:15 UTC

The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner.  If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup.

CVE-2025-32943 framasoft vulnerability CVSS: 0 15 Apr 2025, 11:15 UTC

The vulnerability allows any authenticated user to leak the contents of arbitrary “.m3u8” files from the PeerTube server due to a path traversal in the HLS endpoint.

CVE-2022-0881 framasoft vulnerability CVSS: 4.0 09 Mar 2022, 09:15 UTC

Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.

CVE-2022-0727 framasoft vulnerability CVSS: 5.5 23 Feb 2022, 14:15 UTC

Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.

CVE-2022-0726 framasoft vulnerability CVSS: 5.5 23 Feb 2022, 14:15 UTC

Missing Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.

CVE-2022-0508 framasoft vulnerability CVSS: 5.0 08 Feb 2022, 11:15 UTC

Server-Side Request Forgery (SSRF) in GitHub repository chocobozzz/peertube prior to f33e515991a32885622b217bf2ed1d1b0d9d6832

CVE-2022-0170 framasoft vulnerability CVSS: 4.0 11 Jan 2022, 16:15 UTC

peertube is vulnerable to Improper Access Control

CVE-2022-0133 framasoft vulnerability CVSS: 5.0 10 Jan 2022, 14:12 UTC

peertube is vulnerable to Improper Access Control

CVE-2022-0132 framasoft vulnerability CVSS: 5.0 10 Jan 2022, 14:12 UTC

peertube is vulnerable to Server-Side Request Forgery (SSRF)

CVE-2021-3780 framasoft vulnerability CVSS: 4.3 15 Sep 2021, 12:15 UTC

peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CVE-2017-1000039 framasoft vulnerability CVSS: 7.5 17 Jul 2017, 13:18 UTC

Framadate version 1.0 is vulnerable to Formula Injection in the CSV Export resulting possible Information Disclosure and Code Execution