{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T07:48:30.081","vulnerabilities":[{"cve":{"id":"CVE-2023-7079","sourceIdentifier":"cna@cloudflare.com","published":"2023-12-29T12:15:47.763","lastModified":"2024-11-21T08:45:12.460","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.\n"},{"lang":"es","value":"El envío de solicitudes HTTP especialmente manipuladas y mensajes de inspector al Wrangler's dev server podría hacer que se pueda acceder a cualquier archivo en el equipo del usuario a través de la red local. Un atacante que pudiera engañar a cualquier usuario de la red local para que abra un sitio web malicioso también podría leer cualquier archivo."}],"metrics":{"cvssMetricV31":[{"source":"cna@cloudflare.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"cna@cloudflare.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cloudflare:wrangler:*:*:*:*:*:node.js:*:*","versionStartIncluding":"3.9.0","versionEndExcluding":"3.19.0","matchCriteriaId":"F57F184B-3236-49A1-A736-836FD1BE0075"}]}]}],"references":[{"url":"https://github.com/cloudflare/workers-sdk/pull/4532","source":"cna@cloudflare.com","tags":["Patch"]},{"url":"https://github.com/cloudflare/workers-sdk/pull/4535","source":"cna@cloudflare.com","tags":["Patch"]},{"url":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828","source":"cna@cloudflare.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/cloudflare/workers-sdk/pull/4532","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/cloudflare/workers-sdk/pull/4535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}