{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T02:07:18.543","vulnerabilities":[{"cve":{"id":"CVE-2022-31154","sourceIdentifier":"security-advisories@github.com","published":"2022-08-01T19:15:08.207","lastModified":"2024-11-21T07:04:00.863","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sourcegraph is an opensource code search and navigation engine. It is possible for an authenticated Sourcegraph user to edit the Code Monitors owned by any other Sourcegraph user. This includes being able to edit both the trigger and the action of the monitor in question. An attacker is not able to read contents of existing code monitors, only override the data. The issue is fixed in Sourcegraph 3.42. There are no workaround for the issue and patching is highly recommended."},{"lang":"es","value":"Sourcegraph es un motor de búsqueda y navegación de código abierto. Es posible que un usuario autenticado de Sourcegraph edite los monitores de código que pertenecen a cualquier otro usuario de Sourcegraph. Esto incluye poder editar tanto el trigger como la acción del monitor en cuestión. Un atacante no es capaz de leer el contenido de los monitores de código existentes, sólo anular los datos. El problema ha sido corregido en Sourcegraph versión 3.42. No se presentan mitigaciones para el problema y es recomendado encarecidamente la aplicación de parches"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sourcegraph:sourcegraph:*:*:*:*:*:*:*:*","versionEndExcluding":"3.42.0","matchCriteriaId":"E1C451C2-9995-4330-A8CD-A359B6561DA2"}]}]}],"references":[{"url":"https://github.com/sourcegraph/sourcegraph/pull/37526","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-5866-hhq9-9hpc","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/sourcegraph/sourcegraph/pull/37526","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-5866-hhq9-9hpc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}