Browse all 7 CVE security advisories affecting tryton. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Tryton serves as an enterprise resource planning (ERP) system focused on accounting, inventory, and business process management. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and access control flaws. While no major public security incidents have been widely documented, the 7 recorded CVEs highlight potential risks in web interface components and database interactions. The modular architecture allows for custom extensions but may introduce additional attack surfaces. Security updates are regularly released, emphasizing the importance of timely patching to mitigate identified weaknesses in this business-critical application.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-37014 | Tryton 5.4 - Persistent Cross-Site Scripting — TrytonCWE-79 | 6.4 | Medium | 2026-01-30 |
| CVE-2025-66423 | Tryton trytond 安全漏洞 — trytondCWE-863 | 7.1 | High | 2025-11-30 |
| CVE-2025-66421 | Tryton sao 跨站脚本漏洞 — saoCWE-79 | 5.4 | Medium | 2025-11-30 |
| CVE-2025-66424 | Tryton trytond 安全漏洞 — trytondCWE-863 | 6.5 | Medium | 2025-11-30 |
| CVE-2025-66420 | Tryton sao 跨站脚本漏洞 — saoCWE-79 | 5.4 | Medium | 2025-11-30 |
| CVE-2025-66422 | Tryton trytond 安全漏洞 — trytondCWE-402 | 4.3 | Medium | 2025-11-30 |
| CVE-2012-2238 | Tryton 安全漏洞 — trytond | 7.5 | - | 2019-11-21 |
This page lists every published CVE security advisory associated with tryton. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.