{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T04:36:12.768","vulnerabilities":[{"cve":{"id":"CVE-2022-31065","sourceIdentifier":"security-advisories@github.com","published":"2022-06-27T20:15:08.650","lastModified":"2024-11-21T07:03:49.330","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BigBlueButton is an open source web conferencing system. In affected versions an attacker can embed malicious JS in their username and have it executed on the victim's client. When a user receives a private chat from the attacker (whose username contains malicious JavaScript), the script gets executed. Additionally when the victim receives a notification that the attacker has left the session. This issue has been patched in version 2.4.8 and 2.5.0. There are no known workarounds for this issue."},{"lang":"es","value":"BigBlueButton es un sistema de conferencias web de código abierto. En versiones afectadas un atacante puede insertar JS malicioso en su nombre de usuario y hacer que sea ejecutado en el cliente de la víctima. Cuando un usuario recibe un chat privado del atacante (cuyo nombre de usuario contiene JavaScript malicioso), el script será ejecutado. Además, cuando la víctima recibe una notificación de que el atacante ha abandonado la sesión. Este problema ha sido parcheado en versiones 2.4.8 y 2.5.0. No se presentan mitigaciones conocidas para este problema"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*","versionStartIncluding":"2.4","versionEndExcluding":"2.4.8","matchCriteriaId":"E908036F-9DE8-4FE0-91D0-551180F18E45"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.3.0:*:*:*:*:*:*:*","matchCriteriaId":"00E68199-1E2F-4EED-91DA-5F1D7EF1F2D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4.9:*:*:*:*:*:*:*","matchCriteriaId":"BC4F5D2C-5425-4DCA-BE33-618EDFB75891"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha1:*:*:*:*:*:*","matchCriteriaId":"5380CCEF-88B8-43AA-A76E-18076B1CAE94"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha2:*:*:*:*:*:*","matchCriteriaId":"B30DFF3F-F71E-4412-88F8-790A4A4F459B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha3:*:*:*:*:*:*","matchCriteriaId":"F75A0FD2-BF0A-42AE-8D87-1A749BF1B47F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha4:*:*:*:*:*:*","matchCriteriaId":"454FF756-9526-4A5E-A2A5-390393791F37"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha5:*:*:*:*:*:*","matchCriteriaId":"F7AC4A50-4156-4856-B92D-09E128169D17"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha6:*:*:*:*:*:*","matchCriteriaId":"2AB075EF-BD7A-4AD6-9B0E-2A0242198626"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta1:*:*:*:*:*:*","matchCriteriaId":"080771DC-2CB1-4397-B10E-3B267A476205"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta2:*:*:*:*:*:*","matchCriteriaId":"A3B75DB6-C8D6-4349-AD41-ED203F93623D"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.1:*:*:*:*:*:*","matchCriteriaId":"6290761B-4651-4737-BEA8-D6CDFD09E9E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.2:*:*:*:*:*:*","matchCriteriaId":"B33A1517-C060-4694-A534-E58776451A4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.3:*:*:*:*:*:*","matchCriteriaId":"FAEFCFE7-7A4A-4382-AA30-6069ED41D67B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.4:*:*:*:*:*:*","matchCriteriaId":"6166891D-220A-46A6-A149-76E802FC47D5"}]}]}],"references":[{"url":"https://github.com/bigbluebutton/bigbluebutton/pull/15087","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/bigbluebutton/bigbluebutton/pull/15090","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-8m2p-7qv3-qff7","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/bigbluebutton/bigbluebutton/pull/15087","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/bigbluebutton/bigbluebutton/pull/15090","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-8m2p-7qv3-qff7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}