{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T22:57:59.487","vulnerabilities":[{"cve":{"id":"CVE-2023-48709","sourceIdentifier":"security-advisories@github.com","published":"2024-04-15T18:15:08.877","lastModified":"2025-02-06T21:02:53.030","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"iTop is an IT service management platform.  When exporting data from backoffice or portal in CSV or Excel files, users' inputs may include malicious formulas that may be imported into Excel. As Excel 2016 does **not** prevent Remote Code Execution by default, uninformed users may become victims. This vulnerability is fixed in 2.7.9, 3.0.4, 3.1.1, and 3.2.0."},{"lang":"es","value":"iTop es una plataforma de gestión de servicios de TI. Al exportar datos desde el backoffice o el portal en archivos CSV o Excel, las entradas de los usuarios pueden incluir fórmulas maliciosas que pueden importarse a Excel. Como Excel 2016 **no** impide la ejecución remota de código de forma predeterminada, los usuarios desinformados pueden convertirse en víctimas. Esta vulnerabilidad se solucionó en 2.7.9, 3.0.4, 3.1.1 y 3.2.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-1236"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1236"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.9","matchCriteriaId":"FA0F67ED-5CDF-43B4-80A2-44BBB56A9624"},{"vulnerable":true,"criteria":"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.4","matchCriteriaId":"F42542C8-DEF2-45E2-983B-B161F76C8FDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.1","matchCriteriaId":"E46BEA8B-6ECB-44B7-9509-99E2CBB569EC"}]}]}],"references":[{"url":"https:\/\/github.com\/Combodo\/iTop\/commit\/083a0b79bfa2c106735b5c10eddb35a05ec7f04a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https:\/\/github.com\/Combodo\/iTop\/commit\/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https:\/\/github.com\/Combodo\/iTop\/security\/advisories\/GHSA-9q3x-9987-53x9","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https:\/\/github.com\/Combodo\/iTop\/commit\/083a0b79bfa2c106735b5c10eddb35a05ec7f04a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/github.com\/Combodo\/iTop\/commit\/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/github.com\/Combodo\/iTop\/security\/advisories\/GHSA-9q3x-9987-53x9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}