CVE-2025-58060

Publication date 11 September 2025

Last updated 16 September 2025


Ubuntu priority

Cvss 3 Severity Score

8.0 · High

Score breakdown

When the |Authorization| header is set to |Basic|, but in |scheduler/auth.c| |cupsdAuthorize| |type| is not |CUPSD_AUTH_BASIC|, the step with checking the password is skipped.

Status

Package Ubuntu Release Status
cups 25.04 plucky
Fixed 2.4.12-0ubuntu1.1
24.04 LTS noble
Fixed 2.4.7-1.2ubuntu7.4
22.04 LTS jammy
Fixed 2.4.1op1-1ubuntu4.12
20.04 LTS focal
Fixed 2.3.1-9ubuntu1.9+esm1
18.04 LTS bionic
Fixed 2.2.7-1ubuntu2.10+esm7
16.04 LTS xenial
Fixed 2.1.3-4ubuntu0.11+esm9

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Severity score breakdown

Parameter Value
Base score 8.0 · High
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-7745-1
    • CUPS vulnerabilities
    • 11 September 2025

Other references