<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/ta-p/2532151</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library &lt;/STRONG&gt;&lt;STRONG&gt;form-data&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In mid-July 2025, a vulnerability was disclosed in the NPM library form-data (&lt;A href="https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4" target="_blank"&gt;GitHub Security Advisory&lt;/A&gt;). Qlik became aware of this issue through its standard Secure Development Lifecycle (SDL) processes.&lt;/P&gt;
&lt;P&gt;Following an internal review, Qlik R&amp;amp;D and Security teams identified that potentially vulnerable versions of the form-data library were included in some installations of Qlik Sense Enterprise for Windows. However, due to the specific way Qlik utilizes this library, the conditions required for exploitation are not met.&lt;/P&gt;
&lt;P&gt;Although the vulnerability was determined to be non-exploitable within Qlik Sense, customers who prefer to upgrade to a version that includes the patched form-data library can do so by installing one of the following releases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2025 Patch 6&lt;/LI&gt;
&lt;LI&gt;November 2024 Patch 18&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;May 2024 Patch 24&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;Note&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: &lt;EM&gt;An earlier version of this information was&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt; mistakenly &lt;/SPAN&gt;published indicating that this CVE was directly related to Qlik Sense for Windows.&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2025 14:14:08 GMT</pubDate>
    <dc:creator>Jamie_Gregory</dc:creator>
    <dc:date>2025-10-02T14:14:08Z</dc:date>
    <item>
      <title>Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/ta-p/2532151</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library &lt;/STRONG&gt;&lt;STRONG&gt;form-data&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In mid-July 2025, a vulnerability was disclosed in the NPM library form-data (&lt;A href="https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4" target="_blank"&gt;GitHub Security Advisory&lt;/A&gt;). Qlik became aware of this issue through its standard Secure Development Lifecycle (SDL) processes.&lt;/P&gt;
&lt;P&gt;Following an internal review, Qlik R&amp;amp;D and Security teams identified that potentially vulnerable versions of the form-data library were included in some installations of Qlik Sense Enterprise for Windows. However, due to the specific way Qlik utilizes this library, the conditions required for exploitation are not met.&lt;/P&gt;
&lt;P&gt;Although the vulnerability was determined to be non-exploitable within Qlik Sense, customers who prefer to upgrade to a version that includes the patched form-data library can do so by installing one of the following releases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2025 Patch 6&lt;/LI&gt;
&lt;LI&gt;November 2024 Patch 18&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;May 2024 Patch 24&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;Note&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: &lt;EM&gt;An earlier version of this information was&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt; mistakenly &lt;/SPAN&gt;published indicating that this CVE was directly related to Qlik Sense for Windows.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 14:14:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/ta-p/2532151</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2025-10-02T14:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2025-7783)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532180#M16414</link>
      <description>&lt;P&gt;Good morning!&lt;/P&gt;&lt;P&gt;I noticed the “Published date” for May 2025 Patch 6 hasn’t changed—just checking: is that still the current version with the fix included?&lt;/P&gt;&lt;P&gt;Thanks so much!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2025 07:09:51 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532180#M16414</guid>
      <dc:creator>Thorsten_Grund</dc:creator>
      <dc:date>2025-10-01T07:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2025-7783)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532217#M16415</link>
      <description>&lt;P&gt;Will there be a patch for November 2023, since i believe it is technically still covered under support?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2025 12:20:13 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532217#M16415</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2025-10-01T12:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2025-7783)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532226#M16416</link>
      <description>&lt;P&gt;There is also a Patch 7 available for May 2025, released today (01.10.2025), that isn't mentioned in the &lt;A href="https://community.qlik.com/t5/Release-Notes/Sense-Enterprise-on-Windows-release-notes-May-2025-Initial/ta-p/2516914" target="_self"&gt;release notes&lt;/A&gt;. It's almost doubel the size of Patch 6 (560mb compared to 293mb). What's that about?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2025 13:03:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532226#M16416</guid>
      <dc:creator>steeefan</dc:creator>
      <dc:date>2025-10-01T13:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2025-7783)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532242#M16417</link>
      <description>&lt;P&gt;I am also interested to know&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/44037"&gt;@steeefan&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/1661"&gt;@Jamie_Gregory&lt;/a&gt;&amp;nbsp;as we are planning on upgrading a major global client in a few hours&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2025 14:47:49 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532242#M16417</guid>
      <dc:creator>salshute</dc:creator>
      <dc:date>2025-10-01T14:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532348#M16422</link>
      <description>&lt;P&gt;The Ministry of Information Security in Germany is still listing the CVE as critical - and this is where a lot of customers are watching.&amp;nbsp;&lt;A href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2165" target="_blank"&gt;Warn- und Informationsdienst - Sicherheitshinweis&lt;/A&gt;&amp;nbsp;At least the article is back online, but customers are confused. In addition the missing info about Patch 7. Is there a way to revoke the CVE?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 15:19:38 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532348#M16422</guid>
      <dc:creator>QlikRockStar</dc:creator>
      <dc:date>2025-10-02T15:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532349#M16423</link>
      <description>&lt;P&gt;I noticed that Patch 7 is now listed in the &lt;A href="https://community.qlik.com/t5/Release-Notes/Sense-Enterprise-on-Windows-release-notes-May-2025-Initial/ta-p/2516914" target="_self"&gt;release notes&lt;/A&gt;. What I don't understand is why this patch is all off a sudden twice the size of the previous one.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 15:25:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532349#M16423</guid>
      <dc:creator>steeefan</dc:creator>
      <dc:date>2025-10-02T15:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532369#M16424</link>
      <description>&lt;P&gt;For anyone with clients that have yet to upgrade to newer releases, I submitted a ticket to Qlik on this and got the following response about prior versions, specifically around November 2023.&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;A title="Lewis Ongeri" href="https://customerportal.qlik.com/case/500R500000RIb9TIAT/qlik-sense-cve20257783?c__tab=comments#" target="_blank" rel="noopener"&gt;Lewis Ongeri&lt;/A&gt;&lt;P class=""&gt;&lt;A title="Click for single-item view of this post" href="https://customerportal.qlik.com/case/500R500000RIb9TIAT/qlik-sense-cve20257783?c__tab=comments#" target="_blank" rel="noopener"&gt;Oct 2, 2025&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Hello Jeremy,&lt;BR /&gt;&lt;BR /&gt;Yes I checked that November 2023 is still supported until November 14, 2025. However, this I have checked with the development and security teams and unfortunately, they are no plans to backport changes to the older versions i.e. November 2023.&lt;/DIV&gt;&lt;DIV class=""&gt;------&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Oct 2025 19:51:26 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532369#M16424</guid>
      <dc:creator>jseipel</dc:creator>
      <dc:date>2025-10-02T19:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense and Vulnerability “CVE-2025-7783” in NPM Library form-data</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532470#M16427</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/44037"&gt;@steeefan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;We understand this patch exceeds our standard update size. This is due to a fix addressing a core system component that is infrequently modified. Due to architectural dependencies, deploying changes to this component requires the inclusion of its complete file set, resulting in the larger-than-usual patch size.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 15:08:54 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-and-Vulnerability-CVE-2025-7783-in-NPM-Library-form/tac-p/2532470#M16427</guid>
      <dc:creator>David_Friend</dc:creator>
      <dc:date>2025-10-03T15:08:54Z</dc:date>
    </item>
  </channel>
</rss>

