{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T19:59:50.500","vulnerabilities":[{"cve":{"id":"CVE-2023-41889","sourceIdentifier":"security-advisories@github.com","published":"2023-09-15T21:15:11.503","lastModified":"2024-11-21T08:21:51.613","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SHIRASAGI is a Content Management System. Prior to version 1.18.0, SHIRASAGI is vulnerable to a Post-Unicode normalization issue. This happens when a logical validation or a security check is performed before a Unicode normalization. The Unicode character equivalent of a character would resurface after the normalization. The fix is initially performing the Unicode normalization and then strip for all whitespaces and then checking for a blank string. This issue has been fixed in version 1.18.0.\n"},{"lang":"es","value":"SHIRASAGI es un sistema de gestión de contenidos. Antes de la versión 1.18.0, SHIRASAGI era vulnerable a un problema de normalización posterior a Unicode. Esto sucede cuando se realiza una validación lógica o una verificación de seguridad antes de una normalización Unicode. El carácter Unicode equivalente a un carácter resurgiría después de la normalización. La solución consiste inicialmente en realizar la normalización Unicode y luego eliminar todos los espacios en blanco y luego comprobar si hay una cadena en blanco. Este problema se solucionó en la versión 1.18.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-176"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-116"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ss-proj:shirasagi:*:*:*:*:*:*:*:*","versionEndExcluding":"1.18.0","matchCriteriaId":"96B19CE9-B96E-4A30-9053-7532F1EF6684"}]}]}],"references":[{"url":"https://github.com/shirasagi/shirasagi/blob/f249ce3f06f6bfbc0017b38f5c13de424334c3ea/app/models/concerns/rdf/object.rb#L68-L72","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://sim4n6.beehiiv.com/p/unicode-characters-bypass-security-checks","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/shirasagi/shirasagi/blob/f249ce3f06f6bfbc0017b38f5c13de424334c3ea/app/models/concerns/rdf/object.rb#L68-L72","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://sim4n6.beehiiv.com/p/unicode-characters-bypass-security-checks","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}