{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T05:55:38.148","vulnerabilities":[{"cve":{"id":"CVE-2022-4563","sourceIdentifier":"cna@vuldb.com","published":"2022-12-16T17:15:09.177","lastModified":"2024-11-21T07:35:29.937","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability was found in Freedom of the Press SecureDrop. It has been rated as critical. Affected by this issue is some unknown functionality of the file gpg-agent.conf. The manipulation leads to symlink following. Local access is required to approach this attack. The name of the patch is b0526a06f8ca713cce74b63e00d3730618d89691. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215972."},{"lang":"es","value":"Se encontró una vulnerabilidad en Freedom of the Press SecureDrop. Ha sido calificada como crítica. Una función desconocida del archivo gpg-agent.conf es afectada por este problema. La manipulación conduce al seguimiento de enlaces simbólicos. Se requiere acceso local para abordar este ataque. El nombre del parche es b0526a06f8ca713cce74b63e00d3730618d89691. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-215972."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freedom:securedrop:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.1","matchCriteriaId":"6C784DF9-D6D2-42BD-9214-6EBF116A07ED"}]}]}],"references":[{"url":"https://github.com/freedomofpress/securedrop/commit/b0526a06f8ca713cce74b63e00d3730618d89691","source":"cna@vuldb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/freedomofpress/securedrop/compare/2.5.0...2.5.1","source":"cna@vuldb.com"},{"url":"https://github.com/freedomofpress/securedrop/pull/6704","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://securedrop.org/news/2_5_1-security-advisory/","source":"cna@vuldb.com"},{"url":"https://vuldb.com/?id.215972","source":"cna@vuldb.com","tags":["Permissions Required","Third Party Advisory"]},{"url":"https://github.com/freedomofpress/securedrop/commit/b0526a06f8ca713cce74b63e00d3730618d89691","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/freedomofpress/securedrop/compare/2.5.0...2.5.1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/freedomofpress/securedrop/pull/6704","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://securedrop.org/news/2_5_1-security-advisory/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuldb.com/?id.215972","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"]}]}}]}