{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:51:06.583","vulnerabilities":[{"cve":{"id":"CVE-2023-41898","sourceIdentifier":"security-advisories@github.com","published":"2023-10-19T23:15:08.703","lastModified":"2024-11-21T08:21:52.910","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`."},{"lang":"es","value":"Home Assistant es una domótica de código abierto. La aplicación Home Assistant Companion para Android hasta la versión 2023.8.2 es vulnerable a la carga de URL arbitraria en un WebView. Esto permite todo tipo de ataques, incluida la ejecución arbitraria de JavaScript, la ejecución limitada de código nativo y el robo de credenciales. Este problema se solucionó en la versión 2023.9.2 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema también se rastrea como Informe de vulnerabilidad del GitHub Security Lab (GHSL): `GHSL-2023-142`."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-345"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:android:*:*","versionEndExcluding":"2023.9.2","matchCriteriaId":"E629E5FD-6C86-4A32-9DA0-EBCF5F339716"}]}]}],"references":[{"url":"https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}