{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T11:47:07.308","vulnerabilities":[{"cve":{"id":"CVE-2020-15248","sourceIdentifier":"security-advisories@github.com","published":"2020-11-23T20:15:12.463","lastModified":"2024-11-21T05:05:11.140","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.470, backend users with the default \"Publisher\" system role have access to create & manage users where they can choose which role the new user has. This means that a user with \"Publisher\" access has the ability to escalate their access to \"Developer\" access. Issue has been patched in Build 470 (v1.0.470) & v1.1.1."},{"lang":"es","value":"October es una plataforma CMS gratuita, de código abierto y autohosteada basada en Laravel PHP Framework.&#xa0;En October CMS desde la versión 1.0.319 y anterior a versión 1.0.470, los usuarios de backend con el rol de sistema \"Publisher\" predeterminado tienen acceso para crear y administrar usuarios donde pueden elegir qué rol tiene el nuevo usuario.&#xa0;Esto significa que un usuario con acceso de \"Publisher\" tiene la capacidad de escalar su acceso al acceso de \"Developer\".&#xa0;El problema se ha corregido en Build 470 (versión v1.0.470) y versión v1.1.1"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.6,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":3.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.319","versionEndExcluding":"1.0.469","matchCriteriaId":"ABEFA590-9054-45DD-A177-D5EBEA49C5B7"}]}]}],"references":[{"url":"https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}