{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T09:40:22.772","vulnerabilities":[{"cve":{"id":"CVE-2023-27162","sourceIdentifier":"cve@mitre.org","published":"2023-03-31T20:15:07.437","lastModified":"2025-02-18T17:15:17.150","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openapi-generator:openapi_generator:*:*:*:*:*:*:*:*","versionEndIncluding":"6.4.0","matchCriteriaId":"772A8BE0-7521-4332-8624-D713FD9FA00F"}]}]}],"references":[{"url":"http://openapi-generator.com","source":"cve@mitre.org","tags":["Product"]},{"url":"https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/OpenAPITools/openapi-generator","source":"cve@mitre.org","tags":["Product"]},{"url":"https://notes.sjtu.edu.cn/s/2_yki_2Xq","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"http://openapi-generator.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/OpenAPITools/openapi-generator","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://notes.sjtu.edu.cn/s/2_yki_2Xq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]}]}}]}