UNCLASSIFIED - NO CUI

Skip to content

chore(findings): vivsoft/enbuild/enbuild-mq

Summary

vivsoft/enbuild/enbuild-mq has 120 new findings discovered during continuous monitoring.

Layer: opensource/nodejs/nodejs22:22.13 is EOL, please update if possible

Layer: redhat/ubi/ubi9-minimal:9.5 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=vivsoft/enbuild/enbuild-mq&tag=1.0.22&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2025-48384 Anchore CVE High git-2.49.0-3 0.04084 true
CVE-2021-20066 Twistlock CVE Low jsdom-16.7.0 0.00402 false
CVE-2025-31498 Twistlock CVE Medium nodejs-22.13.1-2.module+el9.5.0+22902+21169374 0.00199 false
CVE-2024-45338 Anchore CVE Medium golang.org/x/net-v0.23.0 0.00189 false
CVE-2024-45338 Anchore CVE Medium golang.org/x/net-v0.26.0 0.00189 false
CVE-2024-45338 Twistlock CVE High golang.org/x/net/html-v0.26.0 0.00189 false
CVE-2024-34156 Anchore CVE High stdlib-go1.22.6 0.00178 false
CVE-2025-3277 Twistlock CVE High nodejs-22.13.1-2.module+el9.5.0+22902+21169374 0.00117 false
CVE-2024-34155 Anchore CVE Medium stdlib-go1.22.6 0.00115 false
CVE-2024-34155 Twistlock CVE Low go/parser-1.22.6 0.00115 false
CVE-2025-48385 Anchore CVE High git-2.49.0-3 0.00112 false
CVE-2024-21538 Anchore CVE Low nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00109 false
CVE-2024-21538 Anchore CVE Low nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00109 false
CVE-2024-21538 Anchore CVE Low npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00109 false
CVE-2024-21538 Anchore CVE Low nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00109 false
CVE-2024-21538 Anchore CVE Low nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00109 false
CVE-2024-34158 Anchore CVE High stdlib-go1.22.6 0.00082 false
CVE-2025-6965 Anchore CVE High nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-6965 Anchore CVE High nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-6965 Anchore CVE High nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-6965 Anchore CVE High npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-6965 Anchore CVE High nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-6965 Twistlock CVE High nodejs-22.13.1-2.module+el9.5.0+22902+21169374 0.00075 false
CVE-2025-23166 Anchore CVE High nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23166 Anchore CVE High nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23166 Anchore CVE High nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23166 Anchore CVE High nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23166 Anchore CVE High npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23166 Twistlock CVE High nodejs-22.13.1-2.module+el9.5.0+22902+21169374 0.00065 false
CVE-2025-23165 Anchore CVE Low nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-23165 Anchore CVE Low nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-23165 Anchore CVE Low npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-23165 Anchore CVE Low nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-23165 Anchore CVE Low nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-23165 Twistlock CVE Low nodejs-22.13.1-2.module+el9.5.0+22902+21169374 0.00063 false
CVE-2025-47907 Anchore CVE High stdlib-go1.24.2 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.10 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.22.6 0.00054 false
CVE-2025-47279 Anchore CVE Low npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00043 false
CVE-2025-47279 Anchore CVE Low nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00043 false
CVE-2025-47279 Anchore CVE Low nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00043 false
CVE-2025-47279 Anchore CVE Low nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00043 false
CVE-2025-47279 Anchore CVE Low nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00043 false
CVE-2025-47279 Twistlock CVE Low nodejs:22-9050020250311103728:rhel9 0.00043 false
CVE-2024-45336 Twistlock CVE Low net/http-1.22.6 0.00041 false
CVE-2024-45336 Anchore CVE Medium stdlib-go1.22.6 0.00041 false
CVE-2025-7458 Anchore CVE Medium nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00033 false
CVE-2025-7458 Anchore CVE Medium nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00033 false
CVE-2025-7458 Anchore CVE Medium nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00033 false
CVE-2025-7458 Anchore CVE Medium nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00033 false
CVE-2025-7458 Anchore CVE Medium npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00033 false
CVE-2024-45341 Twistlock CVE Low crypto/x509-1.22.6 0.00032 false
CVE-2024-45341 Anchore CVE Medium stdlib-go1.22.6 0.00032 false
CVE-2025-29087 Twistlock CVE Medium nodejs:22-9050020250311103728:rhel9 0.00031 false
CVE-2025-8556 Twistlock CVE Low github.com/cloudflare/circl-v1.6.0 0.00022 false
CVE-2025-5889 Twistlock CVE Low brace-expansion-2.0.1 Im mirroring the CVE severity assessment here. Sanitize strings being passed to the function so that they dont contain many , in a row. 0.00022 false
CVE-2025-5889 Twistlock CVE Low brace-expansion-1.1.11 Im mirroring the CVE severity assessment here. Sanitize strings being passed to the function so that they dont contain many , in a row. 0.00022 false
CVE-2025-5889 Anchore CVE Low nodejs-docs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00022 false
CVE-2025-5889 Anchore CVE Low nodejs-full-i18n-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00022 false
CVE-2025-5889 Anchore CVE Low nodejs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00022 false
CVE-2025-5889 Anchore CVE Low npm-1:10.9.2-1.22.13.1.2.module+el9.5.0+22902+21169374 0.00022 false
CVE-2025-5889 Anchore CVE Low nodejs-libs-1:22.13.1-2.module+el9.5.0+22902+21169374 0.00022 false
CVE-2025-5889 Twistlock CVE Low nodejs:22-9050020250311103728:rhel9 0.00022 false
CVE-2025-7783 Twistlock CVE Critical form-data-4.0.2 See the impact section in the attached GHSA. 0.00020 false
CVE-2025-7783 Twistlock CVE Critical form-data-3.0.3 See the impact section in the attached GHSA. 0.00020 false
CVE-2025-27209 Anchore CVE High node-24.2.0 0.00020 false
CVE-2025-4673 Twistlock CVE Low net/http-1.22.6 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.22.6 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.24.2 0.00019 false
CVE-2025-4673 Twistlock CVE Low net/http-1.24.2 0.00019 false
CVE-2025-22872 Twistlock CVE Medium golang.org/x/net/html-v0.26.0 0.00019 false
CVE-2025-48386 Anchore CVE Medium git-2.49.0-3 0.00015 false
CVE-2025-22870 Twistlock CVE Medium golang.org/x/net/http/httpproxy-v0.23.0 0.00015 false
CVE-2025-22870 Twistlock CVE Medium golang.org/x/net/proxy-v0.26.0 0.00015 false
CVE-2025-22871 Twistlock CVE Low net/http/internal-1.22.6 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.22.6 0.00013 false
CVE-2025-22874 Twistlock CVE Low crypto/x509-1.24.2 0.00012 false
CVE-2025-22874 Anchore CVE High stdlib-go1.24.2 0.00012 false
CVE-2025-22866 Twistlock CVE Low crypto/internal/nistec-1.22.6 0.00012 false
CVE-2025-22866 Anchore CVE Medium stdlib-go1.22.6 0.00012 false
CVE-2025-7339 Twistlock CVE Low on-headers-1.0.2 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.24.2 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.22.6 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.10 0.00006 false
f935e34ea2b38a75a020df0ebe7496c4 Anchore Compliance Critical N/A N/A
ec3f1fc5e659910fcaaa3bd83c464bff Anchore Compliance Critical N/A N/A
e54ca05f66839b350beeb78847d62e13 Anchore Compliance Critical N/A N/A
e0cad19b27da5a983fa562c9763b2614 Anchore Compliance Critical N/A N/A
e0abffb0c85dd7e4daf9586a7910b147 Anchore Compliance Critical N/A N/A
c89d499ced76d7681fb8e94816065bea Anchore Compliance Critical N/A N/A
b2f2ebca8d08630f34fd466431feb41a Anchore Compliance Critical N/A N/A
ae852d06a8efa7d2809371fc1823cf42 Anchore Compliance Critical N/A N/A
RHSA-2025:8467 OSCAP Compliance Low N/A N/A
RHSA-2025:7433 OSCAP Compliance Low N/A N/A
RHSA-2025:11802 OSCAP Compliance Low N/A N/A
GHSA-vvgc-356p-c3xw Anchore CVE Medium golang.org/x/net-v0.23.0 N/A N/A
GHSA-vvgc-356p-c3xw Anchore CVE Medium golang.org/x/net-v0.26.0 N/A N/A
GHSA-v778-237x-gjrc Anchore CVE Critical golang.org/x/crypto-v0.21.0 N/A N/A
GHSA-v6h2-p8h4-qcjw Anchore CVE Low brace-expansion-2.0.1 N/A N/A
GHSA-v6h2-p8h4-qcjw Anchore CVE Low brace-expansion-1.1.11 N/A N/A
GHSA-qxp5-gwg8-xv66 Anchore CVE Medium golang.org/x/net-v0.26.0 N/A N/A
GHSA-qxp5-gwg8-xv66 Anchore CVE Medium golang.org/x/net-v0.23.0 N/A N/A
GHSA-hcg3-q754-cr77 Anchore CVE High golang.org/x/crypto-v0.21.0 N/A N/A
GHSA-fjxv-7rqg-78g4 Anchore CVE Critical form-data-4.0.2 N/A N/A
GHSA-fjxv-7rqg-78g4 Anchore CVE Critical form-data-3.0.3 N/A N/A
GHSA-fjxv-7rqg-78g4 Anchore CVE Critical form-data-4.0.2 N/A N/A
GHSA-76c9-3jph-rj3q Anchore CVE Low on-headers-1.0.2 N/A N/A
GHSA-6v2p-p543-phr9 Anchore CVE High golang.org/x/oauth2-v0.21.0 N/A N/A
GHSA-2x5j-vhc8-9cwm Anchore CVE Low github.com/cloudflare/circl-v1.6.0 N/A N/A
99da9bf3a67aedad3d9350c834e6bf7b Anchore Compliance Critical N/A N/A
996fc4b9a1230a5271a6caf2cef02b9e Anchore Compliance Critical N/A N/A
734b70d2d6bbb594ea0785fa87af983d Anchore Compliance Critical N/A N/A
6ea81b21860348f87b5db4b166688c63 Anchore Compliance Critical N/A N/A
6b56eb047b8e2a281d80be044c4bd330 Anchore Compliance Critical N/A N/A
67a42ebf454e09e83ed2da39e53ea2b5 Anchore Compliance Critical N/A N/A
653a57630d566d9983b28e84ac4a0818 Anchore Compliance Critical N/A N/A
4008e00c45ddcce6c411618b2e1d7358 Anchore Compliance Critical N/A N/A
37ffbd4910649ffe1f577938b40b9f41 Anchore Compliance Critical N/A N/A
2ab61fcd6ab30fe13b7b6555991bf3a0 Anchore Compliance Critical N/A N/A
1f4a880789bb79de23756008ae84bb67 Anchore Compliance Critical N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=vivsoft/enbuild/enbuild-mq&tag=1.0.22&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information