Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, users can craft a "Time of Check to Time of Use" (TOCTOU) attack when downloading zip files to access files outside of the OOD_ALLOWLIST. This vulnerability impacts sites that use the file browser allowlists in all current versions of OOD. However, files accessed are still protected by the UNIX permissions. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
History

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
Description Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, users can craft a "Time of Check to Time of Use" (TOCTOU) attack when downloading zip files to access files outside of the OOD_ALLOWLIST. This vulnerability impacts sites that use the file browser allowlists in all current versions of OOD. However, files accessed are still protected by the UNIX permissions. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
Title Open OnDemand allowlist bypass using symlinks in directory downloads (TOCTOU)
Weaknesses CWE-367
CWE-61
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-20T16:53:13.495Z

Updated: 2025-11-21T16:56:40.807Z

Reserved: 2025-10-20T19:41:22.742Z

Link: CVE-2025-62724

cve-icon Vulnrichment

Updated: 2025-11-21T16:56:38.228Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-20T17:15:51.333

Modified: 2025-11-21T15:13:13.800

Link: CVE-2025-62724

cve-icon Redhat

No data.