{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:17:15.381","vulnerabilities":[{"cve":{"id":"CVE-2024-10819","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:20.010","lastModified":"2025-07-14T15:05:59.153","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Cross-Site Request Forgery (CSRF) vulnerability in version 3.83 of binary-husky/gpt_academic allows an attacker to trick a user into uploading files without their consent, exploiting their session. This can lead to unauthorized file uploads and potential system compromise. The uploaded file can contain malicious scripts, leading to stored Cross-Site Scripting (XSS) attacks. Through stored XSS, an attacker can steal information about the victim and perform any action on their behalf."},{"lang":"es","value":"Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versión 3.83 de binary-husky/gpt_academic permite a un atacante engañar a un usuario para que cargue archivos sin su consentimiento, vulnerando su sesión. Esto puede provocar cargas de archivos no autorizadas y una posible vulneración del sistema. El archivo subido puede contener scripts maliciosos, lo que da lugar a ataques de Cross-Site Scripting (XSS) almacenado. Mediante XSS almacenado, un atacante puede robar información sobre la víctima y realizar cualquier acción en su nombre."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:binary-husky:gpt_academic:3.83:*:*:*:*:*:*:*","matchCriteriaId":"63F16447-B71B-4EAC-9ABD-EA8B4D131601"}]}]}],"references":[{"url":"https://huntr.com/bounties/45270c4b-a500-4374-a90b-37b604a3ace0","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}