{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T01:04:58.829","vulnerabilities":[{"cve":{"id":"CVE-2022-25760","sourceIdentifier":"report@snyk.io","published":"2022-03-17T12:15:08.293","lastModified":"2024-11-21T06:52:57.213","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on."},{"lang":"es","value":"Todas las versiones del paquete accesslog son vulnerables a una Inyección de Código Arbitrario debido al uso del constructor Function sin un saneo de entrada. Si la entrada del usuario (controlada por el atacante) le es dada la opción de formato de la función constructora exportada del paquete, es posible que un atacante ejecute código JavaScript arbitrario en el host en el que está siendo ejecutado este paquete"}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:accesslog_project:accesslog:*:*:*:*:*:*:*:*","matchCriteriaId":"A36E23A9-8378-4497-8D7D-5E3B257F492D"}]}]}],"references":[{"url":"https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6","source":"report@snyk.io","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}