Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix.
History

Wed, 10 Sep 2025 19:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:runatlantis:atlantis:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 09 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 07 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Runatlantis
Runatlantis atlantis
Vendors & Products Runatlantis
Runatlantis atlantis

Sat, 06 Sep 2025 20:00:00 +0000

Type Values Removed Values Added
Description Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix.
Title Atlantis Exposes Service Version Publicly on /status API Endpoint
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-09-06T19:47:33.669Z

Updated: 2025-09-08T14:35:06.195Z

Reserved: 2025-09-01T20:03:06.533Z

Link: CVE-2025-58445

cve-icon Vulnrichment

Updated: 2025-09-08T14:34:55.910Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-06T20:15:30.130

Modified: 2025-09-10T19:43:08.493

Link: CVE-2025-58445

cve-icon Redhat

No data.