CVE-2025-3114: Spotfire Code Execution Vulnerability

9.4 CVSS

Description

Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.

Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.

Classification

CVE ID: CVE-2025-3114

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.4

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Products

Vendor: Spotfire, Spotfire, Spotfire, Spotfire, Spotfire, Spotfire, Spotfire

Product: Spotfire Enterprise Runtime for R, Spotfire Statistics Services, Spotfire Analyst, Deployment Kit used in Spotfire Server, Spotfire Desktop, Spotfire for AWS Marketplace, Spotfire Enterprise Runtime for R - Server Edition

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.14% (probability of being exploited)

EPSS Percentile: 35.1% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3114
https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3114-r3484/

Timeline