{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:58:11.438","vulnerabilities":[{"cve":{"id":"CVE-2021-39169","sourceIdentifier":"security-advisories@github.com","published":"2021-08-27T13:15:07.020","lastModified":"2024-11-21T06:18:46.753","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading."},{"lang":"es","value":"Misskey es una platamanera de microblogging descentralizada. En las versiones de Misskey anteriores a 12.51.0, unos actores maliciosos pueden usar el diálogo incorporado en el cliente web para mostrar una cadena maliciosa, conllevando a un ataque de tipo cross-site scripting (XSS). El ataque de  tipo XSS podría comprometer el token de petición de la API. Este problema ha sido corregido en la versión 12.51.0. No se conocen soluciones aparte de la actualización."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:misskey:misskey:*:*:*:*:*:*:*:*","versionEndExcluding":"12.51.0","matchCriteriaId":"8E6D51FB-70AB-4EF8-B173-168D76D8338A"}]}]}],"references":[{"url":"https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cdf6c99","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5ww","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cdf6c99","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5ww","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}