Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66422.json"
[
{
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.70"
}
]
},
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.40"
}
]
},
{
"events": [
{
"introduced": "7.4.0"
},
{
"fixed": "7.4.21"
}
]
},
{
"events": [
{
"introduced": "7.6.0"
},
{
"fixed": "7.6.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.6.11"
}
]
}
]