{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:54:35.179","vulnerabilities":[{"cve":{"id":"CVE-2023-49800","sourceIdentifier":"security-advisories@github.com","published":"2023-12-09T00:15:07.653","lastModified":"2024-11-21T08:33:52.147","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"`nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known  to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options."},{"lang":"es","value":"`nuxt-api-party` es un módulo de código abierto para enviar solicitudes de API. La librería permite al usuario enviar muchas opciones directamente a \"ofetch\". No hay ningún filtro sobre qué opciones están disponibles. Podemos abusar de la lógica de reintento para provocar que el servidor falle debido a un desbordamiento de pila. fetchOptions se obtienen directamente del cuerpo de la solicitud. Un usuario malintencionado puede crear una URL que se sabe que no se recupera correctamente y luego establecer los intentos de reintento en un valor alto; esto provocará un desbordamiento de la pila, ya que el manejo de errores de recuperación funciona de forma recursiva, lo que resulta en una denegación de servicio. Este problema se solucionó en la versión 0.22.1. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben limitar las opciones de grabado."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"},{"lang":"en","value":"CWE-674"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:johannschopplich:nuxt_api_party:*:*:*:*:*:node.js:*:*","versionEndIncluding":"0.21.3","matchCriteriaId":"3FF05127-C972-40EC-A3E2-6733D255DAA2"}]}]}],"references":[{"url":"https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}