UNCLASSIFIED - NO CUI

Skip to content

chore(findings): confluentinc/cp-server-connect

Summary

confluentinc/cp-server-connect has 26 new findings discovered during continuous monitoring.

Layer: confluentinc/cp-base-new:Q2_2025 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=confluentinc/cp-server-connect&tag=7.9.2-1-ubi8&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2023-43804 Anchore CVE Medium python3-pip-wheel-9.0.3-24.el8 0.00472 false
CVE-2024-8088 Anchore CVE Medium python3-libs-3.6.8-71.el8_10 0.00166 false
CVE-2024-8088 Anchore CVE Medium platform-python-3.6.8-71.el8_10 0.00166 false
CVE-2024-37891 Twistlock CVE Medium python3x-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00142 false
CVE-2024-37891 Anchore CVE Medium python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00142 false
CVE-2024-37891 Anchore CVE Medium python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00142 false
CVE-2024-37891 Anchore CVE Medium python3-pip-wheel-9.0.3-24.el8 0.00142 false
CVE-2025-8291 Anchore CVE Medium python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da 0.00073 false
CVE-2025-8291 Anchore CVE Medium python39-3.9.20-2.module+el8.10.0+23441+1124c1da 0.00073 false
CVE-2025-8291 Twistlock CVE Medium python3x-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00073 false
CVE-2025-8291 Twistlock CVE Medium python39-3.9.20-2.module+el8.10.0+23441+1124c1da 0.00073 false
CVE-2025-8291 Twistlock CVE Medium python3x-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb 0.00073 false
CVE-2023-45803 Twistlock CVE Medium python3x-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00055 false
CVE-2023-45803 Anchore CVE Medium python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00055 false
CVE-2023-45803 Anchore CVE Medium python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 0.00055 false
CVE-2023-45803 Anchore CVE Medium python3-pip-wheel-9.0.3-24.el8 0.00055 false
CVE-2023-52426 Anchore CVE Medium expat-2.2.5-17.el8_10 0.00019 false
CVE-2025-6075 Anchore CVE Low python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da N/A false
CVE-2025-6075 Anchore CVE Low python39-3.9.20-2.module+el8.10.0+23441+1124c1da N/A false
CVE-2025-6075 Twistlock CVE Low python3x-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 N/A false
CVE-2025-6075 Twistlock CVE Low python39-3.9.20-2.module+el8.10.0+23441+1124c1da N/A false
CVE-2025-6075 Twistlock CVE Low python3x-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb N/A false
CVE-2025-12863 Anchore CVE High libxml2-2.9.7-21.el8_10.3 N/A false
CVE-2025-10966 Twistlock CVE Medium curl-7.61.1-34.el8_10.8 N/A false
CVE-2025-10966 Anchore CVE Medium curl-7.61.1-34.el8_10.8 N/A false
CVE-2025-10966 Anchore CVE Medium libcurl-7.61.1-34.el8_10.8 N/A false

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=confluentinc/cp-server-connect&tag=7.9.2-1-ubi8&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information