{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:29:38.547","vulnerabilities":[{"cve":{"id":"CVE-2022-35975","sourceIdentifier":"security-advisories@github.com","published":"2022-08-18T18:15:08.250","lastModified":"2024-11-21T07:12:05.500","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The GitOps Tools Extension for VSCode can make it easier to manage Flux objects. A specially crafted Flux object may allow for remote code execution in the machine running the extension, in the context of the user that is running VSCode. Users using the VSCode extension to manage clusters that are shared amongst other users are affected by this issue. The only safe mitigation is to update to the latest version of the extension."},{"lang":"es","value":"La extensión de GitOps Tools para VSCode puede facilitar la administración de objetos Flux. Un objeto Flux especialmente diseñado puede permitir una ejecución de código remota en la máquina que ejecuta la extensión, en el contexto del usuario que está ejecutando VSCode. Los usuarios usando la extensión VSCode para administrar clústeres compartidos entre otros usuarios están afectados por este problema. La única mitigación segura es actualizar a la última versión de la extensión."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:weave:gitops_tools:*:*:*:*:*:visual_studio_code:*:*","versionStartIncluding":"0.7.0","versionEndIncluding":"0.20.2","matchCriteriaId":"CDE02047-FACA-4A00-B767-3BBD661AF713"}]}]}],"references":[{"url":"https://github.com/weaveworks/vscode-gitops-tools/security/advisories/GHSA-873x-829r-gxcp","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/weaveworks/vscode-gitops-tools/security/advisories/GHSA-873x-829r-gxcp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}