{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:39:48.205","vulnerabilities":[{"cve":{"id":"CVE-2021-32745","sourceIdentifier":"security-advisories@github.com","published":"2021-07-21T18:15:09.403","lastModified":"2024-11-21T06:07:39.470","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Collabora Online is a collaborative online office suite. A reflected XSS vulnerability was found in Collabora Online prior to version 6.4.9-5. An attacker could inject unescaped HTML into a variable as they created the Collabora Online iframe, and execute scripts inside the context of the Collabora Online iframe. This would give access to a small set of user settings stored in the browser, as well as the session's authentication token which was also passed in at iframe creation time. The issue is patched in Collabora Online 6.4.9-5. Collabora Online 4.2 is not affected."},{"lang":"es","value":"Collabora Online es una suite de office colaborativa online. Se ha encontrado una vulnerabilidad de tipo XSS reflejado en Collabora Online anterior a versión 6.4.9-5. Un atacante podría inyectar HTML sin escapar en una variable ya que crearon el iframe de Collabora Online, y ejecutar scripts dentro del contexto del iframe de Collabora Online. Esto daría acceso a un pequeño ajuste de configuraciones de usuario almacenadas en el navegador, así como al token de autenticación de la sesión que también se pasaba en el momento de la creación del iframe. El problema está parcheado en Collabora Online 6.4.9-5. Collabora Online 4.2 no está afectado"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*","versionStartExcluding":"4.2","versionEndExcluding":"6.4.9-5","matchCriteriaId":"FC8766E9-B468-4349-A1BA-5AC81F650F6D"}]}]}],"references":[{"url":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-w536-654v-cjj9","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-w536-654v-cjj9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}