CVE-2019-25695 – R Project
“When code meant for analysis becomes a path to execution, everything is at risk.”
This patch addresses a high-severity vulnerability in the R programming language that could allow attackers to execute arbitrary code within affected environments. The issue impacts how R processes certain inputs, creating a pathway for malicious code execution in systems that rely on R for statistical computing and data analysis.
CVE-2019-25695 has a CVSS score of 8.4, which is High severity. This level of risk indicates significant impact, particularly in environments where R is integrated into automated workflows or exposed to untrusted input sources.
Public proof-of-concept code is available, increasing the likelihood of exploitation and making this vulnerability a practical threat in real-world scenarios.
Key Details
- Attack Vector
- Local
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- CWE Classification
- CWE-787