{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T15:13:11.568","vulnerabilities":[{"cve":{"id":"CVE-2017-7271","sourceIdentifier":"cve@mitre.org","published":"2017-03-27T17:59:00.947","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Reflected Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.11, when development mode is used, allows remote attackers to inject arbitrary web script or HTML via crafted request data that is mishandled on the debug-mode exception screen."},{"lang":"es","value":"Vulnerabilidad de XSS en Yii Framework en versiones anteriores a 2.0.11, cuando se utiliza el modo de desarrollo, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de datos de solicitud manipulados que no se manejan adecuadamente en la pantalla de excepción del modo de depuración."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yii_software:yii:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.10","matchCriteriaId":"D5DCD2A8-1911-4C3E-B526-7913DA4BB3D8"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/97167","source":"cve@mitre.org"},{"url":"http://www.yiiframework.com/news/123/yii-2-0-11-is-released/","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://github.com/yiisoft/yii2/commit/97171a0db7cda0a49931ee0c3b998ef50bd06756","source":"cve@mitre.org"},{"url":"https://github.com/yiisoft/yii2/pull/13401","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/97167","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.yiiframework.com/news/123/yii-2-0-11-is-released/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://github.com/yiisoft/yii2/commit/97171a0db7cda0a49931ee0c3b998ef50bd06756","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/yiisoft/yii2/pull/13401","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}