{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:12:24.736","vulnerabilities":[{"cve":{"id":"CVE-2024-28192","sourceIdentifier":"security-advisories@github.com","published":"2024-03-13T21:16:00.823","lastModified":"2025-01-24T15:11:10.747","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 is vulnerable to NoSQL injection in the public access token processing logic. Attackers can fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This vulnerability allows an attacker to fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"your_spotify es un panel de seguimiento de Spotify autohospedado y de código abierto. La versión de YourSpotify &lt;1.8.0 es vulnerable a la inyección NoSQL en la lógica de procesamiento del token de acceso público. Los atacantes pueden eludir por completo el mecanismo de autenticación de token público, independientemente de si se ha generado un token público antes o no, sin ninguna interacción del usuario ni conocimiento previo. Esta vulnerabilidad permite a un atacante eludir por completo el mecanismo de autenticación de token público, independientemente de si se ha generado un token público antes o no, sin ninguna interacción del usuario ni conocimiento previo. Este problema se solucionó en la versión 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-943"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.0","matchCriteriaId":"4B8BF8EC-918E-446C-B00C-345B7A707F07"}]}]}],"references":[{"url":"https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}