Insertion of Sensitive Information into Externally-Accessible File or Directory Affecting nautobot-ssot package, versions [,3.10.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-NAUTOBOTSSOT-13654023
  • published23 Oct 2025
  • disclosed21 Oct 2025
  • creditGary Snider

Introduced: 21 Oct 2025

NewCVE-2025-62607  (opens in a new tab)
CWE-538  (opens in a new tab)

How to fix?

Upgrade nautobot-ssot to version 3.10.0 or higher.

Overview

nautobot-ssot is a Nautobot Single Source of Truth

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Externally-Accessible File or Directory by placing the Service Now public instance name e.g. companyname.service-now.com in a generic django view with no authentication.

Note:

  1. This does not expose the Secret, the Secret Name, or the Secret Value for the Username/Password for Service-Now.com.
  2. An unauthenticated member would not be able to change the instance name, nor set a Secret.
  3. There is not a way to gain access to other pages Nautobot through the unauthenticated Configuration page.

Workaround

This vulnerability can be mitigated by disabling the servicenow SSoT integration.

CVSS Base Scores

version 4.0
version 3.1