Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 10 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:runatlantis:atlantis:*:*:*:*:*:*:*:* | |
| Metrics | 
        
        cvssV3_1
         
  | 
Tue, 09 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Sun, 07 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Runatlantis
         Runatlantis atlantis  | 
|
| Vendors & Products | 
        
        Runatlantis
         Runatlantis atlantis  | 
Sat, 06 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix. | |
| Title | Atlantis Exposes Service Version Publicly on /status API Endpoint | |
| Weaknesses | CWE-200 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-06T19:47:33.669Z
Updated: 2025-09-08T14:35:06.195Z
Reserved: 2025-09-01T20:03:06.533Z
Link: CVE-2025-58445
Updated: 2025-09-08T14:34:55.910Z
Status : Analyzed
Published: 2025-09-06T20:15:30.130
Modified: 2025-09-10T19:43:08.493
Link: CVE-2025-58445
No data.