cvelist/2025/3xxx/CVE-2025-3688.json
2025-04-16 13:00:32 +00:00

119 lines
4.1 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-3688",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, was found in mirweiye Seven Bears Library CMS 2023. This affects an unknown part of the component Background Management Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in mirweiye Seven Bears Library CMS 2023 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Komponente Background Management Page. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "mirweiye",
"product": {
"product_data": [
{
"product_name": "Seven Bears Library CMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2023"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.304977",
"refsource": "MISC",
"name": "https://vuldb.com/?id.304977"
},
{
"url": "https://vuldb.com/?ctiid.304977",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.304977"
},
{
"url": "https://vuldb.com/?submit.553486",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.553486"
},
{
"url": "https://github.com/KKDT12138/CVE/blob/main/cve.pdf",
"refsource": "MISC",
"name": "https://github.com/KKDT12138/CVE/blob/main/cve.pdf"
}
]
},
"credits": [
{
"lang": "en",
"value": "kkdt (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 2.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 2.4,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
}
]
}
}