{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T05:15:24.794","vulnerabilities":[{"cve":{"id":"CVE-2019-14999","sourceIdentifier":"security@atlassian.com","published":"2019-08-23T14:15:11.670","lastModified":"2024-11-21T04:27:50.860","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Uninstall REST endpoint in Atlassian Universal Plugin Manager before version 2.22.19, from version 3.0.0 before version 3.0.3 and from version 4.0.0 before version 4.0.3 allows remote attackers to uninstall plugins using a Cross-Site Request Forgery (CSRF) vulnerability on an authenticated administrator."},{"lang":"es","value":"El punto final REST de desinstalación en Atlassian Universal Plugin Manager antes de la versión 2.22.19, de la versión 3.0.0 antes de la versión 3.0.3 y de la versión 4.0.0 antes de la versión 4.0.3 permite a los atacantes remotos desinstalar complementos utilizando una falsificación de solicitud entre sitios ( CSRF) vulnerabilidad en un administrador autenticado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"2.22.19","matchCriteriaId":"121AEF1B-E092-453B-AD35-5FC946021A3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.3","matchCriteriaId":"5B381C60-6F2D-47A3-8A80-92188DC02F78"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.3","matchCriteriaId":"9B633550-159E-465F-95D4-5085B9C461E9"}]}]}],"references":[{"url":"https://ecosystem.atlassian.net/browse/UPM-6044","source":"security@atlassian.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://ecosystem.atlassian.net/browse/UPM-6044","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}