CVE-2019-25695 – R Project

CVSS 8.4 IMPORTANT

“When code meant for analysis becomes a path to execution, everything is at risk.”

This patch addresses a high-severity vulnerability in the R programming language that could allow attackers to execute arbitrary code within affected environments. The issue impacts how R processes certain inputs, creating a pathway for malicious code execution in systems that rely on R for statistical computing and data analysis.

CVE-2019-25695 has a CVSS score of 8.4, which is High severity. This level of risk indicates significant impact, particularly in environments where R is integrated into automated workflows or exposed to untrusted input sources.

Public proof-of-concept code is available, increasing the likelihood of exploitation and making this vulnerability a practical threat in real-world scenarios.

Key Details

Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-787
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.