A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
https://sparkle-project.org/documentation/security-and-reliability/
https://security.netapp.com/advisory/ntap-20250124-0008/
https://github.com/sparkle-project/Sparkle/pull/2550
Source: Mitre, NVD
Published: 2025-02-04
Updated: 2025-08-05
Base Score: 7.2
Vector: CVSS2#AV:A/AC:L/Au:M/C:C/I:C/A:C
Severity: High
Base Score: 6.8
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity: Medium
EPSS: 0.00028