{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T10:59:05.196","vulnerabilities":[{"cve":{"id":"CVE-2021-39215","sourceIdentifier":"security-advisories@github.com","published":"2021-09-15T18:15:09.323","lastModified":"2024-11-21T06:18:55.400","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jitsi Meet is an open source video conferencing application. In versions prior to 2.0.5963, a Prosody module allows the use of symmetrical algorithms to validate JSON web tokens. This means that tokens generated by arbitrary sources can be used to gain authorization to protected rooms. This issue is fixed in Jitsi Meet 2.0.5963. There are no known workarounds aside from updating."},{"lang":"es","value":"Jitsi Meet es una aplicación de videoconferencia de código abierto. En  versiones anteriores a 2.0.5963, un módulo de Prosody permite el uso de algoritmos simétricos para comprender los tokens web JSON. Esto significa que los tokens generados por fuentes arbitrarias pueden ser usados para conseguir autorización a las salas protegidas. Este problema ha sido corregido en Jitsi Meet versión 2.0.5963. No se presentan soluciones conocidas aparte de la actualización"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:8x8:jitsi_meet:2.0.5963:*:*:*:*:*:*:*","matchCriteriaId":"439D9E5E-1BD8-40D1-97BD-B3F4E4EFBBAF"}]}]}],"references":[{"url":"https://github.com/jitsi/jitsi-meet/pull/9319","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-45ff-37jm-xjfx","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/jitsi/jitsi-meet/pull/9319","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-45ff-37jm-xjfx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}