{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:38:03.918","vulnerabilities":[{"cve":{"id":"CVE-2021-32750","sourceIdentifier":"security-advisories@github.com","published":"2021-07-15T17:15:08.527","lastModified":"2024-11-21T06:07:40.070","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MuWire is a file publishing and networking tool that protects the identity of its users by using I2P technology. Users of MuWire desktop client prior to version 0.8.8 can be de-anonymized by an attacker who knows their full ID. An attacker could send a message with a subject line containing a URL with an HTML image tag and the MuWire client would try to fetch that image via clearnet, thus exposing the IP address of the user. The problem is fixed in MuWire 0.8.8. As a workaround, users can disable messaging functionality to prevent other users from sending them malicious messages."},{"lang":"es","value":"MuWire es una herramienta de publicación de archivos y redes que protege la identidad de sus usuarios al usar la tecnología I2P. Unos usuarios de MuWire desktop client versiones anteriores a 0.8.8, pueden ser desanonimizados por un atacante que conozca su ID completa. Un atacante podría enviar un mensaje con una línea de asunto conteniendo una URL con una etiqueta de imagen HTML y el cliente MuWire trataría de obtener esa imagen por medio de clearnet, exponiendo así la dirección IP del usuario. El problema es corregido en MuWire versión 0.8.8. Como solución, los usuarios pueden desactivar la funcionalidad de mensajería para prevenir a otros usuarios de enviar mensajes maliciosos"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:muwire_project:muwire:*:*:*:*:*:*:*:*","versionEndExcluding":"0.8.8","matchCriteriaId":"543B74AA-4A9D-4BB7-B75E-906ABCEAB9A7"}]}]}],"references":[{"url":"https://github.com/zlatinb/muwire/security/advisories/GHSA-68xh-9h7w-64qg","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/zlatinb/muwire/security/advisories/GHSA-68xh-9h7w-64qg","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}