{"id":"CLEANSTART-2026-GN47077","summary":"Within HostnameError","details":"Multiple security vulnerabilities affect the rabbitmq-messaging-topology-operator package. Within HostnameError. See references for individual vulnerability details.","modified":"2026-04-02T13:46:42.203066870Z","published":"2026-01-30T14:48:53.159123Z","upstream":["CVE-2025-61727","CVE-2025-61729","GHSA-6V2P-P943-PHR9","GHSA-C6GW-W398-HV78","GHSA-F6X5-JH6R-WRFV","GHSA-J5W8-Q4QC-RX2X","GHSA-QXP5-GW88-XV66","GHSA-V778-237X-GJRC","GHSA-VVGC-356P-C3XW"],"database_specific":{},"references":[{"type":"ADVISORY","url":"https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GN47077"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61727"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61729"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-6V2P-P943-PHR9"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-C6GW-W398-HV78"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-F6X5-JH6R-WRFV"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-J5W8-Q4QC-RX2X"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-QXP5-GW88-XV66"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-V778-237X-GJRC"},{"type":"WEB","url":"https://osv.dev/vulnerability/GHSA-VVGC-356P-C3XW"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61727"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61729"}],"affected":[{"package":{"name":"rabbitmq-messaging-topology-operator","ecosystem":"CleanStart"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.15.0-r1"}]}],"database_specific":{"source":"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-GN47077.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}