CVE-2025-9301

Source
https://cve.org/CVERecord?id=CVE-2025-9301
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9301.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-9301
Downstream
Related
Published
2025-08-21T14:15:44.137Z
Modified
2026-03-15T22:52:03.959440Z
Severity
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in cmake 4.1.20250725-gb5cce23. This affects the function cmForEachFunctionBlocker::ReplayItems of the file cmForEachCommand.cxx. This manipulation causes reachable assertion. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. Patch name: 37e27f71bc356d880c908040cd0cb68fa2c371b8. It is suggested to install a patch to address this issue.

References

Affected packages

Git / gitlab.kitware.com/cmake/cmake

Affected ranges

Type
GIT
Repo
https://gitlab.kitware.com/cmake/cmake
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*
v2.8.0
v2.8.1
v2.8.10
v2.8.10.1
v2.8.10.2
v2.8.11
v2.8.11.1
v2.8.11.2
v2.8.12
v2.8.12.1
v2.8.12.2
v2.8.2
v2.8.3
v2.8.4
v2.8.5
v2.8.6
v2.8.7
v2.8.8
v2.8.9
v3.*
v3.0.0
v3.0.0-rc1
v3.0.0-rc2
v3.0.0-rc3
v3.0.0-rc4
v3.0.0-rc5
v3.0.0-rc6
v3.0.1
v3.0.2
v3.1.0
v3.1.0-rc1
v3.1.0-rc2
v3.1.0-rc3
v3.1.1
v3.1.2
v3.1.3
v3.10.0
v3.10.0-rc1
v3.10.0-rc2
v3.10.0-rc3
v3.10.0-rc4
v3.10.0-rc5
v3.10.1
v3.10.2
v3.10.3
v3.11.0
v3.11.0-rc1
v3.11.0-rc2
v3.11.0-rc3
v3.11.0-rc4
v3.11.1
v3.11.2
v3.11.3
v3.11.4
v3.12.0
v3.12.0-rc1
v3.12.0-rc2
v3.12.0-rc3
v3.12.1
v3.12.2
v3.12.3
v3.12.4
v3.13.0
v3.13.0-rc1
v3.13.0-rc2
v3.13.0-rc3
v3.13.1
v3.13.2
v3.13.3
v3.13.4
v3.13.5
v3.14.0
v3.14.0-rc1
v3.14.0-rc2
v3.14.0-rc3
v3.14.0-rc4
v3.14.1
v3.14.2
v3.14.3
v3.14.4
v3.14.5
v3.14.6
v3.14.7
v3.15.0
v3.15.0-rc1
v3.15.0-rc2
v3.15.0-rc3
v3.15.0-rc4
v3.15.1
v3.15.2
v3.15.3
v3.15.4
v3.15.5
v3.15.6
v3.15.7
v3.16.0
v3.16.0-rc1
v3.16.0-rc2
v3.16.0-rc3
v3.16.0-rc4
v3.16.1
v3.16.2
v3.16.3
v3.16.4
v3.16.5
v3.16.6
v3.16.7
v3.16.8
v3.16.9
v3.17.0
v3.17.0-rc1
v3.17.0-rc2
v3.17.0-rc3
v3.17.1
v3.17.2
v3.17.3
v3.17.4
v3.17.5
v3.18.0
v3.18.0-rc1
v3.18.0-rc2
v3.18.0-rc3
v3.18.0-rc4
v3.18.1
v3.18.2
v3.18.3
v3.18.4
v3.18.5
v3.18.6
v3.19.0
v3.19.0-rc1
v3.19.0-rc2
v3.19.0-rc3
v3.19.1
v3.19.2
v3.19.3
v3.19.4
v3.19.5
v3.19.6
v3.19.7
v3.19.8
v3.2.0
v3.2.0-rc1
v3.2.0-rc2
v3.2.1
v3.2.2
v3.2.3
v3.20.0
v3.20.0-rc1
v3.20.0-rc2
v3.20.0-rc3
v3.20.0-rc4
v3.20.0-rc5
v3.20.1
v3.20.2
v3.20.3
v3.20.4
v3.20.5
v3.20.6
v3.21.0
v3.21.0-rc1
v3.21.0-rc2
v3.21.0-rc3
v3.21.1
v3.21.2
v3.21.3
v3.21.4
v3.21.5
v3.21.6
v3.21.7
v3.22.0
v3.22.0-rc1
v3.22.0-rc2
v3.22.0-rc3
v3.22.1
v3.22.2
v3.22.3
v3.22.4
v3.22.5
v3.22.6
v3.23.0
v3.23.0-rc1
v3.23.0-rc2
v3.23.0-rc3
v3.23.0-rc4
v3.23.0-rc5
v3.23.1
v3.23.2
v3.23.3
v3.23.4
v3.23.5
v3.24.0
v3.24.0-rc1
v3.24.0-rc2
v3.24.0-rc3
v3.24.0-rc4
v3.24.0-rc5
v3.24.1
v3.24.2
v3.24.3
v3.24.4
v3.25.0
v3.25.0-rc1
v3.25.0-rc2
v3.25.0-rc3
v3.25.0-rc4
v3.25.1
v3.25.2
v3.25.3
v3.26.0
v3.26.0-rc1
v3.26.0-rc2
v3.26.0-rc3
v3.26.0-rc4
v3.26.0-rc5
v3.26.0-rc6
v3.26.1
v3.26.2
v3.26.3
v3.26.4
v3.26.5
v3.26.6
v3.27.0
v3.27.0-rc1
v3.27.0-rc2
v3.27.0-rc3
v3.27.0-rc4
v3.27.0-rc5
v3.27.1
v3.27.2
v3.27.3
v3.27.4
v3.27.5
v3.27.6
v3.27.7
v3.27.8
v3.27.9
v3.28.0
v3.28.0-rc1
v3.28.0-rc2
v3.28.0-rc3
v3.28.0-rc4
v3.28.0-rc5
v3.28.0-rc6
v3.28.1
v3.28.2
v3.28.3
v3.28.4
v3.28.5
v3.28.6
v3.29.0
v3.29.0-rc1
v3.29.0-rc2
v3.29.0-rc3
v3.29.0-rc4
v3.29.1
v3.29.2
v3.29.3
v3.29.4
v3.29.5
v3.29.6
v3.29.7
v3.29.8
v3.29.9
v3.3.0
v3.3.0-rc1
v3.3.0-rc2
v3.3.0-rc3
v3.3.0-rc4
v3.3.1
v3.3.2
v3.30.0
v3.30.0-rc1
v3.30.0-rc2
v3.30.0-rc3
v3.30.0-rc4
v3.30.1
v3.30.2
v3.30.3
v3.30.4
v3.30.5
v3.30.6
v3.30.7
v3.30.8
v3.30.9
v3.31.0
v3.31.0-rc1
v3.31.0-rc2
v3.31.0-rc3
v3.31.1
v3.31.2
v3.31.3
v3.31.4
v3.31.5
v3.31.6
v3.31.7
v3.31.8
v3.4.0
v3.4.0-rc1
v3.4.0-rc2
v3.4.0-rc3
v3.4.1
v3.4.2
v3.4.3
v3.5.0
v3.5.0-rc1
v3.5.0-rc2
v3.5.0-rc3
v3.5.1
v3.5.2
v3.6.0
v3.6.0-rc1
v3.6.0-rc2
v3.6.0-rc3
v3.6.0-rc4
v3.6.1
v3.6.2
v3.6.3
v3.7.0
v3.7.0-rc1
v3.7.0-rc2
v3.7.0-rc3
v3.7.1
v3.7.2
v3.8.0
v3.8.0-rc1
v3.8.0-rc2
v3.8.0-rc3
v3.8.0-rc4
v3.8.1
v3.8.2
v3.9.0
v3.9.0-rc1
v3.9.0-rc2
v3.9.0-rc3
v3.9.0-rc4
v3.9.0-rc5
v3.9.0-rc6
v3.9.1
v3.9.2
v3.9.3
v3.9.4
v3.9.5
v3.9.6
v4.*
v4.0.0
v4.0.0-rc1
v4.0.0-rc2
v4.0.0-rc3
v4.0.0-rc4
v4.0.0-rc5
v4.0.1
v4.0.2
v4.0.3
v4.1.0
v4.1.0-rc1
v4.1.0-rc2
v4.1.0-rc3
v4.1.0-rc4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9301.json"
vanir_signatures
[
    {
        "signature_type": "Line",
        "source": "https://gitlab.kitware.com/cmake/cmake@37e27f71bc356d880c908040cd0cb68fa2c371b8",
        "id": "CVE-2025-9301-09a05382",
        "deprecated": false,
        "target": {
            "file": "Source/cmForEachCommand.cxx"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "228043602418574992660422980917345339206",
                "45640607635578571517308188507225526581",
                "87054998341120757898501218577121764349",
                "72846618754852695696322263449499194572"
            ],
            "threshold": 0.9
        }
    },
    {
        "signature_type": "Function",
        "source": "https://gitlab.kitware.com/cmake/cmake@37e27f71bc356d880c908040cd0cb68fa2c371b8",
        "id": "CVE-2025-9301-ef7bf956",
        "deprecated": false,
        "target": {
            "function": "cmForEachFunctionBlocker::Replay",
            "file": "Source/cmForEachCommand.cxx"
        },
        "signature_version": "v1",
        "digest": {
            "length": 185.0,
            "function_hash": "302829191689443455907304212024363053501"
        }
    }
]