{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T03:00:55.091","vulnerabilities":[{"cve":{"id":"CVE-2022-35976","sourceIdentifier":"security-advisories@github.com","published":"2022-08-18T19:15:14.593","lastModified":"2024-11-21T07:12:05.630","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The GitOps Tools Extension for VSCode relies on kubeconfigs in order to communicate with Kubernetes clusters. A specially crafted kubeconfig leads to arbitrary code execution on behalf of the user running VSCode. Users relying on kubeconfigs that are generated or altered by other processes or users are affected by this issue. Please note that the vulnerability is specific to this extension, and the same kubeconfig would not result in arbitrary code execution when used with kubectl. Using only trust-worthy kubeconfigs is a safe mitigation. However, updating to the latest version of the extension is still highly recommended."},{"lang":"es","value":"La extensión de GitOps Tools para VSCode es basada en kubeconfigs para comunicarse con los clusters de Kubernetes. Una kubeconfig especialmente diseñada conlleva a una ejecución de código arbitrario en nombre del usuario que ejecuta VSCode. Los usuarios que dependen de kubeconfigs generados o alterados por otros procesos o usuarios están afectados por este problema. Tenga en cuenta que la vulnerabilidad es específica de esta extensión, y el mismo kubeconfig no resultaría en la ejecución de código arbitrario cuando es usada con kubectl. usar sólo kubeconfigs confiables es una mitigación segura. Sin embargo, la actualización a la última versión de la extensión sigue siendo muy recomendable."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.1,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:weave:gitops_tools:*:*:*:*:*:visual_studio_code:*:*","versionStartIncluding":"0.5.0","versionEndIncluding":"0.20.9","matchCriteriaId":"40BDAEF7-757B-44AB-A042-97CEA0798553"}]}]}],"references":[{"url":"https://github.com/weaveworks/vscode-gitops-tools/security/advisories/GHSA-287h-vjhw-jqf7","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/weaveworks/vscode-gitops-tools/security/advisories/GHSA-287h-vjhw-jqf7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}