{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:26:16.737","vulnerabilities":[{"cve":{"id":"CVE-2021-3619","sourceIdentifier":"cve@rapid7.com","published":"2021-07-22T19:15:09.030","lastModified":"2024-11-21T06:21:59.860","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds."},{"lang":"es","value":"Rapid7 Velociraptor versiones 0.5.9 y anteriores, son vulnerables a un problema de  tipo cross-site scripting (XSS) persistente después de la autenticación, en el que un usuario autenticado podría abusar del sniffing de tipo de archivo MIME para insertar código ejecutable en una carga maliciosa. Este problema fue corregido en versión 0.6.0. Tenga en cuenta que los derechos de acceso a Velociraptor están casi siempre reservados a usuarios confiable y comprobado con experiencia en seguridad informática"}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*","versionEndExcluding":"0.6.0","matchCriteriaId":"68D7C188-6C55-4173-A1BA-D16528CCAC40"}]}]}],"references":[{"url":"https://github.com/Velocidex/velociraptor/pull/1118","source":"cve@rapid7.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Velocidex/velociraptor/releases/tag/v0.6.0","source":"cve@rapid7.com","tags":["Third Party Advisory"]},{"url":"https://github.com/Velocidex/velociraptor/pull/1118","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Velocidex/velociraptor/releases/tag/v0.6.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}