{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T02:22:31.514","vulnerabilities":[{"cve":{"id":"CVE-2023-40511","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-05-03T03:15:26.340","lastModified":"2025-04-10T14:34:37.260","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LG Simple Editor checkServer Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the checkServer method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system.\n. Was ZDI-CAN-20013."},{"lang":"es","value":"LG Simple Editor comprueba la vulnerabilidad de omisión de autenticación del servidor. Esta vulnerabilidad permite a atacantes remotos evitar la autenticación en las instalaciones afectadas de LG Simple Editor. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del método checkServer. El problema se debe a la exposición de credenciales en texto plano. Un atacante puede aprovechar esta vulnerabilidad para eludir la autenticación en el sistema. Fue ZDI-CAN-20013."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*","matchCriteriaId":"DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1215/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1215/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}