{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T07:38:40.080","vulnerabilities":[{"cve":{"id":"CVE-2021-32721","sourceIdentifier":"security-advisories@github.com","published":"2021-06-29T19:15:09.707","lastModified":"2024-11-21T06:07:35.913","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds."},{"lang":"es","value":"PowerMux es un sustituto de http.ServeMux de Go. En las versiones de PowerMux anteriores a 1.1.1, los atacantes pueden ser capaces de diseñar enlaces de suplantación de identidad y otras redireccionamiento abiertos al explotar la funcionalidad trailing slash redirection. Esto puede conllevar a que los usuarios sean redirigidos a sitios no confiables después de seguir un enlace diseñado por un atacante. El problema se ha resuelto en la versión 1.1.1. No hay soluciones existentes"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:powermux_project:powermux:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.1","matchCriteriaId":"AFC05BB7-69D2-4F41-8FD2-88A20DB687C3"}]}]}],"references":[{"url":"https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}