{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T12:33:24.583","vulnerabilities":[{"cve":{"id":"CVE-2024-39954","sourceIdentifier":"security@apache.org","published":"2025-08-20T09:15:27.297","lastModified":"2025-08-21T18:25:41.767","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\\linux\\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources.\nUsers are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue."},{"lang":"es","value":"CWE-918 Server-Side Request Forgery (SSRF) en eventmesh-runtime module in WebhookUtil.java on windows\\linux\\mac os e.g., permite al atacante abusar de la funcionalidad del servidor para leer o actualizar recursos internos. Se recomienda a los usuarios actualizar a la versión 1.12.0 o usar la rama master, que soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:*","versionEndExcluding":"1.12.0","matchCriteriaId":"C0681588-FB0B-4250-9544-B8E3CCB6B3B0"}]}]}],"references":[{"url":"https://lists.apache.org/thread/v6c96zygqx8xc2k3n2d59mgnm5txhkon","source":"security@apache.org","tags":["Mailing List"]}]}}]}