{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T05:08:28.809","vulnerabilities":[{"cve":{"id":"CVE-2022-25312","sourceIdentifier":"security@apache.org","published":"2022-03-05T00:15:07.783","lastModified":"2024-11-21T06:51:58.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7."},{"lang":"es","value":"Se ha detectado una vulnerabilidad de inyección de tipo XML external entity (XXE) en el extractor de hojas XSLTStyles de Any23 RDFa y se sabe que afecta a las versiones de Any23 versiones anteriores a 2.7. La vulnerabilidad de tipo XML external entity (también se conoce como XXE) es una vulnerabilidad de seguridad web que permite a un atacante interferir con el procesamiento de datos XML de una aplicación. A menudo permite a un atacante visualizar archivos en el sistema de archivos del servidor de la aplicación, e interactuar con cualquier back-end o sistema externo al que la propia aplicación pueda acceder. Este problema ha sido corregido en Apache Any23 versión 2.7"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:any23:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7","matchCriteriaId":"61A3006C-C343-487D-9AE7-2CED5D91CC88"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2022/03/04/2","source":"security@apache.org","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2022/03/04/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}