Does Retool post a timeline for resolving security vulnerabiltiies? I ran a security scan on the latest image (3.196.20) at this time and there seems to be multiple that could be fixed quickly.
CPE vulnerabilities:
Name: cpe:2.3nodejs:node.js, Version: 20.18.1, Path: /usr/local/bin/node
- CVE-2025-23083, Severity: HIGH, Source: Sign In to VulnCheck
- CVSS score: 7.7, CVSS exploitability score: 2.5
- Fixed version: 20.18.2
- CVE-2025-23166, Severity: HIGH, Source: Sign In to VulnCheck
- CVSS score: 7.5, CVSS exploitability score: 3.9
- Fixed version: 20.19.2
Library vulnerabilities:
Name: com.databricks:databricks-jdbc, Version: 2.6.32, Path: /retool_backend/jdbcdrivers/DatabricksJDBC42.jar
- CVE-2024-49194, Severity: HIGH, Source: Databricks JDBC Driver Command Injection vulnerability ยท CVE-2024-49194 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 7.3, CVSS exploitability score: 2.1
- Fixed version: 2.6.40
Name: com.fasterxml.jackson.core:jackson-core, Version: 2.13.4, Path: /retool_backend/jdbcdrivers/DatabricksJDBC42.jar -> META-INF/maven/com.fasterxml.jackson.core/jackson-core
- CVE-2025-52999, Severity: HIGH, Source: jackson-core can throw a StackoverflowError when processing deeply nested data ยท CVE-2025-52999 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 8.7
- Fixed version: 2.15.0
Name: axios, Version: 0.27.2, Path: /retool_backend/package.json
- CVE-2025-27152, Severity: HIGH, Source: axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL ยท CVE-2025-27152 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 7.7
- Fixed version: 0.30.0
Name: form-data, Version: 4.0.3, Path: /retool_backend/package.json
- CVE-2025-7783, Severity: CRITICAL, Source: form-data uses unsafe random function in form-data for choosing boundary ยท CVE-2025-7783 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 9.4
- Fixed version: 4.0.4
Name: jspdf, Version: 2.5.1, Path: /retool_backend/package.json
- CVE-2025-29907, Severity: HIGH, Source: jsPDF Bypass Regular Expression Denial of Service (ReDoS) ยท CVE-2025-29907 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 8.7
- Fixed version: 3.0.1
Name: knex, Version: 0.21.16, Path: /retool_backend/package.json
- CVE-2016-20018, Severity: HIGH, Source: Knex.js has a limited SQL injection vulnerability ยท CVE-2016-20018 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 7.5, CVSS exploitability score: 3.9
- Fixed version: 2.4.0
- Has public exploit
Name: mysql2, Version: 2.3.3, Path: /retool_backend/package.json
- CVE-2024-21508, Severity: CRITICAL, Source: mysql2 Remote Code Execution (RCE) via the readCodeFor function ยท CVE-2024-21508 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 9.8, CVSS exploitability score: 3.9
- Fixed version: 3.9.4
- CVE-2024-21511, Severity: CRITICAL, Source: MySQL2 for Node Arbitrary Code Injection ยท CVE-2024-21511 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 9.8, CVSS exploitability score: 3.9
- Fixed version: 3.9.7
- CVE-2024-21512, Severity: HIGH, Source: mysql2 vulnerable to Prototype Pollution ยท CVE-2024-21512 ยท GitHub Advisory Database ยท GitHub
- CVSS score: 8.2, CVSS exploitability score: 3.9
- Fixed version: 3.9.8
Summary:
- Vulnerable packages: CRITICAL: 2, HIGH: 6, MEDIUM: 0, LOW: 0, INFORMATIONAL: 0
Total: 8 - Vulnerabilities: CRITICAL: 3, HIGH: 8, MEDIUM: 0, LOW: 0, INFORMATIONAL: 0
Total: 11 (all fixable)