UNCLASSIFIED - NO CUI

Skip to content

chore(findings): aperio-global/russel/documentation-generation

Summary

aperio-global/russel/documentation-generation has 102 new findings discovered during continuous monitoring.

Layer: opensource/python:v3.11.8 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=aperio-global/russel/documentation-generation&tag=1.0&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2024-11393 Twistlock CVE High transformers-4.24.0 0.43666 false
CVE-2024-11392 Twistlock CVE High transformers-4.24.0 0.38281 false
CVE-2024-39689 Twistlock CVE High certifi-2022.9.24 0.21233 false
CVE-2024-3568 Twistlock CVE Low transformers-4.24.0 0.20071 false
CVE-2024-11394 Twistlock CVE High transformers-4.24.0 0.13019 false
CVE-2023-32681 Twistlock CVE Medium requests-2.28.1 Requires that deployment or integration of requests is being used to a connect to untrusted hosts b is connecting over HTTPS and c is using proxies to do so. 0.06121 false
CVE-2023-29483 Twistlock CVE Low dnspython-2.2.1 0.04857 false
CVE-2024-24762 Twistlock CVE High python-multipart-0.0.5 If you have endpoints that read form data, then youre vulnerable. 0.01802 false
CVE-2023-29159 Twistlock CVE High starlette-0.20.4 Requires sensitive content to be hidden in a sibling directory that is named with an almostidentical name. Rename StaticFiles directory to a completely unique name. 0.01332 false
CVE-2023-30798 Twistlock CVE High starlette-0.20.4 Multipart form fields are a relatively commonly used feature of WSGI frameworks. Upstream writeshttpsgithub.comencodestarlettesecurityadvisoriesGHSA74m52c7w9w3x writes that In older versions, its also possible to instead of calling request.form call request.stream and parse the form data in internal code. 0.00726 false
CVE-2024-34064 Twistlock CVE Low jinja2-3.1.2 This requires using a specific filter in an uncommon way. Prefilter user input that you plan to pass as the keys. Values do not need to be filtered, as they are already escaped. 0.00576 false
CVE-2023-43804 Twistlock CVE High urllib3-1.26.12 Usage of the Cookie header is rare with urllib3. This is more common and useful in browsers. Redirections to another origin are also not the common case. 0.00472 false
CVE-2024-53981 Twistlock CVE High python-multipart-0.0.5 If you are parsing form data, youre vulnerable. 0.00346 false
CVE-2024-3651 Twistlock CVE Medium idna-3.4 0.00338 false
CVE-2024-3772 Twistlock CVE Medium pydantic-1.10.2 0.00280 false
CVE-2025-32434 Twistlock CVE Critical torch-1.13.1 0.00225 false
CVE-2023-6730 Twistlock CVE Critical transformers-4.24.0 0.00182 false
CVE-2023-7018 Twistlock CVE High transformers-4.24.0 0.00155 false
CVE-2024-37891 Twistlock CVE Medium urllib3-1.26.12 Theres no reason to set ProxyAuthorization without using urllib3s proxy support. Using the ProxyAuthorization header with urllib3s ProxyManager. Disabling HTTP redirects using redirectsFalse when sending requests. Not using the ProxyAuthorization header. 0.00142 false
CVE-2025-27516 Twistlock CVE High jinja2-3.1.2 This vulnerability impacts applications which execute untrusted templates. This is uncommon for web and other document rendering use cases, but may be common in deployment tools that allow third party plugins. 0.00138 false
CVE-2024-56326 Twistlock CVE Low jinja2-3.1.2 This vulnerability impacts applications which execute untrusted templates. This is uncommon for web and other document rendering use cases, but may be common in deployment tools that allow third party plugins. 0.00116 false
CVE-2024-12720 Twistlock CVE Medium transformers-4.24.0 0.00115 false
CVE-2023-37920 Twistlock CVE Critical certifi-2022.9.24 Many uses of Certifi use systemprovided CA certs. 0.00115 false
CVE-2024-47081 Twistlock CVE Medium requests-2.28.1 0.00104 false
CVE-2024-27454 Twistlock CVE Low orjson-3.8.1 0.00104 false
CVE-2025-1194 Twistlock CVE Medium transformers-4.24.0 0.00094 false
CVE-2025-2099 Twistlock CVE Medium transformers-4.24.0 0.00093 false
CVE-2024-22195 Twistlock CVE Medium jinja2-3.1.2 This requires using a specific filter in an uncommon way. Prefilter user input that you plan to pass as the keys. Values do not need to be filtered, as they are already escaped. 0.00093 false
CVE-2025-3264 Twistlock CVE Medium transformers-4.24.0 0.00081 false
CVE-2025-3263 Twistlock CVE Medium transformers-4.24.0 0.00081 false
CVE-2024-34062 Twistlock CVE Low tqdm-4.64.1 Requires running with an alreadycompromised CLI argument 0.00081 false
CVE-2025-3777 Twistlock CVE Low transformers-4.24.0 0.00080 false
CVE-2025-3933 Twistlock CVE Medium transformers-4.24.0 0.00074 false
CVE-2024-47874 Twistlock CVE High starlette-0.20.4 0.00074 false
CVE-2025-54121 Twistlock CVE Medium starlette-0.20.4 Its a rare case. Check the commit that fixes the issue and patch yourself. 0.00067 false
CVE-2025-5197 Twistlock CVE Medium transformers-4.24.0 0.00063 false
CVE-2025-6638 Twistlock CVE Medium transformers-4.24.0 0.00060 false
CVE-2025-6051 Twistlock CVE Medium transformers-4.24.0 0.00060 false
CVE-2024-31583 Twistlock CVE High torch-1.13.1 0.00059 false
CVE-2023-45803 Twistlock CVE Medium urllib3-1.26.12 No exploits from real world were reported Disable redirects for services that you arent expecting to respond with redirects with redirectsFalse.Disable automatic redirects with redirectsFalse and handle 303 redirects manually by stripping the HTTP request body. 0.00055 false
CVE-2025-6921 Twistlock CVE Medium transformers-4.24.0 0.00049 false
CVE-2025-43859 Twistlock CVE Critical h11-0.14.0 0.00047 false
CVE-2024-35195 Twistlock CVE Medium requests-2.28.1 0.00044 false
CVE-2024-1135 Twistlock CVE High gunicorn-20.1.0 0.00040 false
CVE-2024-56201 Twistlock CVE High jinja2-3.1.2 This vulnerability impacts applications which execute untrusted templates where the template author can also choose the template filename. This is uncommon for web and other document rendering use cases, but may be common in deployment tools that allow third party plugins. Check if any template filenames contain curly braces and . If so, and the braces enclose Python code, audit or remove those files. 0.00031 false
CVE-2024-31580 Twistlock CVE High torch-1.13.1 0.00029 false
CVE-2025-50181 Twistlock CVE Medium urllib3-1.26.12 Most users dont disable redirects on the PoolManager. Set redirectsFalseredirects0 on the .request call instead of on the toplevel urllib3.PoolManager 0.00023 false
CVE-2024-6827 Twistlock CVE High gunicorn-20.1.0 0.00023 false
CVE-2023-2800 Twistlock CVE Medium transformers-4.24.0 0.00018 false
ac2d42483db3571ea57457f90c1783b1 Anchore Compliance Critical N/A N/A
PRISMA-2022-0168 Twistlock CVE High pip-25.3 N/A N/A
GHSA-xqr8-7jwr-rhp7 Anchore CVE High certifi-2022.9.24 N/A N/A
GHSA-wrfc-pvp9-mr9g Anchore CVE High transformers-4.24.0 N/A N/A
GHSA-w3h3-4rj7-4ph4 Anchore CVE High gunicorn-20.1.0 N/A N/A
GHSA-vqfr-h8mv-ghfj Anchore CVE Critical h11-0.14.0 N/A N/A
GHSA-v845-jxx5-vc9f Anchore CVE High urllib3-1.26.12 N/A N/A
GHSA-v68g-wm8c-6x7j Anchore CVE High transformers-4.24.0 N/A N/A
GHSA-v5gw-mw7f-84px Anchore CVE Medium starlette-0.20.4 N/A N/A
GHSA-rcv9-qm8p-9p6j Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-qxrp-vhvm-j765 Anchore CVE High transformers-4.24.0 N/A N/A
GHSA-qq3j-4f4f-9583 Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-q2x7-8rv6-6q7h Anchore CVE Medium jinja2-3.1.2 N/A N/A
GHSA-q2wp-rjmx-x6x9 Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-pwr2-4v36-6qpr Anchore CVE High orjson-3.8.1 N/A N/A
GHSA-pq67-6m6q-mj2v Anchore CVE Medium urllib3-1.26.12 N/A N/A
GHSA-phhr-52qp-3mj4 Anchore CVE Low transformers-4.24.0 N/A N/A
GHSA-pg7h-5qx3-wjr3 Anchore CVE High torch-1.13.1 N/A N/A
GHSA-mr82-8j83-vxmv Anchore CVE Medium pydantic-1.10.2 N/A N/A
GHSA-jjph-296x-mrcr Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-jjg7-2v4v-x38h Anchore CVE Medium idna-3.4 N/A N/A
GHSA-j8r2-6x86-q33q Anchore CVE Medium requests-2.28.1 N/A N/A
GHSA-hxxf-235m-72v3 Anchore CVE High transformers-4.24.0 N/A N/A
GHSA-hc5x-x2vx-497g Anchore CVE High gunicorn-20.1.0 N/A N/A
GHSA-h75v-3vvj-5mfj Anchore CVE Medium Jinja2-3.1.2 N/A N/A
GHSA-h5c8-rqwp-cp95 Anchore CVE Medium Jinja2-3.1.2 N/A N/A
GHSA-gmj6-6f8f-6699 Anchore CVE Medium jinja2-3.1.2 N/A N/A
GHSA-g7vv-2v7x-gj9p Anchore CVE Low tqdm-4.64.1 N/A N/A
GHSA-g4mx-q9vg-27p4 Anchore CVE Medium urllib3-1.26.12 N/A N/A
GHSA-fpwr-67px-3qhx Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-f96h-pmfr-66vw Anchore CVE High starlette-0.20.4 N/A N/A
GHSA-cpwx-vrp4-4pq7 Anchore CVE Medium jinja2-3.1.2 N/A N/A
GHSA-9wx4-h78v-vm56 Anchore CVE Medium requests-2.28.1 N/A N/A
GHSA-9hjg-9r4m-mvj7 Anchore CVE Medium requests-2.28.1 N/A N/A
GHSA-9356-575x-2w9m Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-887c-mr87-cxwp Anchore CVE Medium torch-1.13.1 N/A N/A
GHSA-74m5-2c7w-9w3x Anchore CVE High starlette-0.20.4 N/A N/A
GHSA-6rvg-6v2m-4j46 Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-5pcm-hx3q-hm94 Anchore CVE High torch-1.13.1 N/A N/A
GHSA-59p9-h35m-wg4g Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-59g5-xgcq-4qw3 Anchore CVE High python-multipart-0.0.5 N/A N/A
GHSA-53q9-r3pm-6pq6 Anchore CVE Critical torch-1.13.1 N/A N/A
GHSA-4w7r-h757-3r74 Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-3rq5-2g8h-59hc Anchore CVE Medium dnspython-2.2.1 N/A N/A
GHSA-3863-2447-669p Anchore CVE Critical transformers-4.24.0 N/A N/A
GHSA-37q5-v5qm-c9v8 Anchore CVE Low transformers-4.24.0 N/A N/A
GHSA-37mw-44qp-f5jm Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-3749-ghw9-m3mg Anchore CVE Low torch-1.13.1 N/A N/A
GHSA-34jh-p97f-mpxf Anchore CVE Medium urllib3-1.26.12 N/A N/A
GHSA-2jv5-9r88-3w3p Anchore CVE High python-multipart-0.0.5 N/A N/A
GHSA-2c2j-9gv5-cj73 Anchore CVE Medium starlette-0.20.4 N/A N/A
GHSA-282v-666c-3fvg Anchore CVE Medium transformers-4.24.0 N/A N/A
GHSA-248v-346w-9cwc Anchore CVE Low certifi-2022.9.24 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=aperio-global/russel/documentation-generation&tag=1.0&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information