{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:43:53.452","vulnerabilities":[{"cve":{"id":"CVE-2023-52077","sourceIdentifier":"security-advisories@github.com","published":"2023-12-27T19:15:07.763","lastModified":"2024-11-21T08:39:07.370","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs.  This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5."},{"lang":"es","value":"Nexkey es una bifurcación liviana de Misskey v12 optimizada para servidores de tamaño pequeño y mediano. Antes de 12.23Q4.5, Nexkey permitía que aplicaciones externas que utilizaran tokens emitidos por administradores y moderadores llamaran a las API de administración. Esto permite que aplicaciones maliciosas de terceros realicen operaciones como actualizar la configuración del servidor, así como comprometer el almacenamiento de objetos y las credenciales del servidor de correo electrónico. Este problema se solucionó en 12.23Q4.5."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L","baseScore":8.9,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nexryai:nexkey:*:*:*:*:*:node.js:*:*","versionEndExcluding":"12.23q4.5","matchCriteriaId":"FC7AC948-828A-4C9A-9010-FC8BBFDBCFC5"}]}]}],"references":[{"url":"https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}