{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:42:12.578","vulnerabilities":[{"cve":{"id":"CVE-2020-1961","sourceIdentifier":"security@apache.org","published":"2020-05-04T13:15:14.033","lastModified":"2024-11-21T05:11:44.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered."},{"lang":"es","value":"Una vulnerabilidad de Inyección de Plantillas del Lado del Servidor en las plantillas de Correo para Apache Syncope versiones 2.0.X anteriores a  la versión 2.0.15, versiones 2.1.X anteriores a la versión 2.1.6, que permiten a atacantes inyectar expresiones JEXL arbitrarias, conllevando a una Ejecución de Código Remota (RCE)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.15","matchCriteriaId":"35845EE4-A8AC-4F33-8317-CEF91BB492E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"2.1.6","matchCriteriaId":"31260109-834D-4DCF-AA29-754026EC13A2"}]}]}],"references":[{"url":"http://syncope.apache.org/security","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"http://syncope.apache.org/security","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}