{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T21:49:33.003","vulnerabilities":[{"cve":{"id":"CVE-2021-32644","sourceIdentifier":"security-advisories@github.com","published":"2021-06-22T18:15:08.077","lastModified":"2024-11-21T06:07:26.737","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3."},{"lang":"es","value":"Ampache es una aplicación de streaming de audio/vídeo de código abierto y un gestor de archivos. Debido a una falta de filtrado de entrada, las versiones 4.x.y son vulnerables a una inyección de código en el archivo random.php. El ataque requiere una autentificación del usuario para acceder a la página random.php a menos que el sitio se este ejecutando en modo demo. Este problema ha sido resuelto en versión 4.4.3"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ampache:ampache:4.4.2:*:*:*:*:*:*:*","matchCriteriaId":"A7C0883A-CBC7-4C94-A748-CB94CA3D0B45"}]}]}],"references":[{"url":"https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}