{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T19:06:25.491","vulnerabilities":[{"cve":{"id":"CVE-2023-42458","sourceIdentifier":"security-advisories@github.com","published":"2023-09-21T17:15:22.483","lastModified":"2024-11-21T08:22:34.657","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zope is an open-source web application server. Prior to versions 4.8.10 and 5.8.5, there is a stored cross site scripting vulnerability for SVG images. Note that an image tag with an SVG image as source is never vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link. Patches are available in Zope 4.8.10 and 5.8.5. As a workaround, make sure the \"Add Documents, Images, and Files\" permission is only assigned to trusted roles. By default, only the Manager has this permission."},{"lang":"es","value":"Zope es un servidor de aplicaciones web de código abierto. Antes de las versiones 4.8.10 y 5.8.5, existe una vulnerabilidad de Cross Site Scripting almacenado para imágenes SVG. Tenga en cuenta que una etiqueta de imagen con una imagen SVG como fuente nunca es vulnerable, incluso cuando la imagen SVG contiene código malicioso. Para explotar la vulnerabilidad, un atacante primero tendría que cargar una imagen y luego engañar al usuario para que siga un enlace especialmente manipulado. Los parches están disponibles en Zope 4.8.10 y 5.8.5. Como workaround, asegúrese de que el permiso \"Add Documents, Images, and Files\" solo esté asignado a roles confiables. De forma predeterminada, sólo el Administrador tiene este permiso."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-80"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.10","matchCriteriaId":"9E52EB57-D398-4D1B-8AB1-7D2B97991DC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.8.5","matchCriteriaId":"D9C57E3B-BC61-4FAF-A431-4E9C9402F251"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/09/22/2","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/zopefoundation/Zope/commit/26a55dbc301db417f47cafda6fe0f983b5690088","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/commit/603b0a12881c90a072a7a65e32d47ed898ce37cb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/security/advisories/GHSA-wm8q-9975-xh5v","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2023/09/22/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/zopefoundation/Zope/commit/26a55dbc301db417f47cafda6fe0f983b5690088","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/commit/603b0a12881c90a072a7a65e32d47ed898ce37cb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/security/advisories/GHSA-wm8q-9975-xh5v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}