{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T02:11:03.788","vulnerabilities":[{"cve":{"id":"CVE-2022-2653","sourceIdentifier":"security@huntr.dev","published":"2022-08-04T10:15:08.060","lastModified":"2024-11-21T07:01:26.927","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system."},{"lang":"es","value":"Con esta vulnerabilidad un atacante puede leer muchos archivos confidenciales como los archivos de configuración, o el archivo /proc/self/environ, que contiene la variable de entorno usada por el servidor web que incluye las credenciales de la base de datos. Si el usuario del servidor web es root, un atacante podrá leer cualquier archivo del sistema"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:planka:planka:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.1","matchCriteriaId":"5F2CB549-0F44-4B52-8130-E1A385F24A4A"}]}]}],"references":[{"url":"https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418","source":"security@huntr.dev","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70","source":"security@huntr.dev","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]}]}}]}