{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:15:24.538","vulnerabilities":[{"cve":{"id":"CVE-2023-40580","sourceIdentifier":"security-advisories@github.com","published":"2023-08-25T20:15:08.913","lastModified":"2024-11-21T08:19:45.347","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Freighter is a Stellar chrome extension. It may be possible for a malicious website to access the recovery mnemonic phrase when the Freighter wallet is unlocked. This vulnerability impacts access control to the mnemonic recovery phrase. This issue was patched in version 5.3.1."},{"lang":"es","value":"Freighter es una extensión de Stellar para Chrome. Puede ser posible que un sitio web malicioso acceda a la frase mnemotécnica de recuperación cuando se desbloquea el monedero de Freighter. Esta vulnerabilidad afecta al control de acceso a la frase mnemotécnica de recuperación. Este problema fue parcheado en la versión 5.3.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stellar:freighter:*:*:*:*:*:*:*:*","versionEndExcluding":"5.3.1","matchCriteriaId":"3846CA30-6154-4221-BDA9-6E4B9CF3837E"}]}]}],"references":[{"url":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/stellar/freighter/pull/948","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/stellar/freighter/pull/948","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}