{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T17:35:23.038","vulnerabilities":[{"cve":{"id":"CVE-2024-27091","sourceIdentifier":"security-advisories@github.com","published":"2024-03-27T13:15:47.023","lastModified":"2025-12-19T18:28:57.200","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"GeoNode is a geospatial content management system, a platform for the management and publication of geospatial data. An issue exists within GEONODE where the current rich text editor is vulnerable to Stored XSS. The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user's email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed. This vulnerability is fixed in 4.2.3."},{"lang":"es","value":"GeoNode es un sistema de gestión de contenidos geoespaciales, una plataforma para la gestión y publicación de datos geoespaciales. Existe un problema dentro de GEONODE donde el editor de texto enriquecido actual es vulnerable al XSS almacenado. Las cookies de la aplicación se configuran de forma segura, pero es posible recuperar el token CSRF de la víctima y emitir una solicitud para cambiar la dirección de correo electrónico de otro usuario para realizar una toma de control completa de la cuenta. Debido a que el elemento del script no afecta la política CORS, las solicitudes se realizarán correctamente. Esta vulnerabilidad se soluciona en 4.2.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*","versionStartExcluding":"3.2.0","versionEndExcluding":"4.2.3","matchCriteriaId":"014827B6-7C66-4238-A628-EA9E2897A136"}]}]}],"references":[{"url":"https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}