{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T15:39:40.572","vulnerabilities":[{"cve":{"id":"CVE-2023-46238","sourceIdentifier":"security-advisories@github.com","published":"2023-10-26T15:15:09.173","lastModified":"2024-11-21T08:28:08.540","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZITADEL is an identity infrastructure management system. ZITADEL users can upload their own avatar image using various image types including SVG. SVG can include scripts, such as javascript, which can be executed during rendering. Due to a missing security header, an attacker could inject code to an SVG to gain access to the victim’s account in certain scenarios. A victim would need to directly open the malicious image in the browser, where a single session in ZITADEL needs to be active for this exploit to work. If the possible victim had multiple or no active sessions in ZITADEL, the attack would not succeed. This issue has been patched in version 2.39.2 and 2.38.2."},{"lang":"es","value":"ZITADEL es un sistema de gestión de infraestructura de identidad. Los usuarios de ZITADEL pueden cargar su propia imagen de avatar utilizando varios tipos de imágenes, incluido SVG. SVG puede incluir scripts, como javascript, que se pueden ejecutar durante el renderizado. Debido a la falta de un encabezado de seguridad, un atacante podría inyectar código en un SVG para obtener acceso a la cuenta de la víctima en ciertos escenarios. Una víctima necesitaría abrir directamente la imagen maliciosa en el navegador, donde debe haber una única sesión activa en ZITADEL para que este exploit funcione. Si la posible víctima tuviera varias sesiones activas o ninguna en ZITADEL, el ataque no tendría éxito. Este problema se solucionó en las versiones 2.39.2 y 2.38.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionEndExcluding":"2.38.2","matchCriteriaId":"223DDD74-92C5-4069-9422-B64A3D12EF6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.39.0","versionEndExcluding":"2.39.2","matchCriteriaId":"2ED84934-B055-4AA2-A96F-168846A8F62A"}]}]}],"references":[{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.38.2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.39.2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zitadel/zitadel/security/advisories/GHSA-954h-jrpm-72pm","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.38.2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.39.2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zitadel/zitadel/security/advisories/GHSA-954h-jrpm-72pm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}