Headline
GHSA-jqfc-9q34-prhg: trytond allows remote attackers to obtain sensitive trace-back (server setup) information
Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
Skip to content
Navigation Menu
AI CODE CREATION
GitHub CopilotWrite better code with AI
GitHub SparkBuild and deploy intelligent apps
GitHub ModelsManage and compare prompts
MCP RegistryNewIntegrate external tools
View all features
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-66422
trytond allows remote attackers to obtain sensitive trace-back (server setup) information
Moderate severity GitHub Reviewed Published Nov 30, 2025 to the GitHub Advisory Database • Updated Dec 2, 2025
Package
pip trytond (pip)
Affected versions
>= 7.5.0, < 7.6.11
>= 7.1.0, < 7.4.21
>= 7.0.0, < 7.0.40
< 6.0.70
Patched versions
7.6.11
7.4.21
7.0.40
6.0.70
Description
Published to the GitHub Advisory Database
Nov 30, 2025