{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T04:55:18.008","vulnerabilities":[{"cve":{"id":"CVE-2024-41802","sourceIdentifier":"security-advisories@github.com","published":"2024-07-30T16:15:04.400","lastModified":"2024-11-21T09:33:06.117","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the APIs for importing JSON and importing a Layout containing DataSet data.\nUsers should upgrade to version 3.3.12 or 4.0.14 which fix this issue"},{"lang":"es","value":" Xibo es un sistema de gestión de contenidos (CMS). Se descubrió una vulnerabilidad de inyección SQL en las rutas API dentro del CMS responsable del filtrado de conjuntos de datos. Esto permite a un usuario autenticado obtener y modificar datos arbitrarios de la base de datos Xibo inyectando valores especialmente manipulados en las API para importar JSON e importar un diseño que contenga datos de DataSet. Los usuarios deben actualizar a la versión 3.3.12 o 4.0.14, que soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"3.3.12","matchCriteriaId":"A20B9BFF-DDA4-424F-BC7E-1133A9AB1C2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.14","matchCriteriaId":"8A00D67E-5432-413A-9E64-4635502A945F"}]}]}],"references":[{"url":"https://github.com/xibosignage/xibo-cms/commit/b7a5899338cd841a39702e3fcaff76aa0ffe4075","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-x4qm-vvhp-g7c2","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://xibosignage.com/blog/security-advisory-2024-07","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/xibosignage/xibo-cms/commit/b7a5899338cd841a39702e3fcaff76aa0ffe4075","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-x4qm-vvhp-g7c2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://xibosignage.com/blog/security-advisory-2024-07","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}