{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:18:40.369","vulnerabilities":[{"cve":{"id":"CVE-2024-46976","sourceIdentifier":"security-advisories@github.com","published":"2024-09-17T21:15:12.763","lastModified":"2025-01-03T14:52:32.863","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Backstage is an open framework for building developer portals. An attacker with control of the contents of the TechDocs storage buckets is able to inject executable scripts in the TechDocs content that will be executed in the victim's browser when browsing documentation or navigating to an attacker provided link. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Backstage es un framework abierto para crear portales para desarrolladores. Un atacante con control sobre el contenido de los depósitos de almacenamiento de TechDocs puede inyectar secuencias de comandos ejecutables en el contenido de TechDocs que se ejecutarán en el navegador de la víctima cuando explore la documentación o navegue hacia un enlace proporcionado por el atacante. Esto se ha solucionado en la versión 1.10.13 del paquete `@backstage/plugin-techdocs-backend`. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-693"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:backstage:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10.13","matchCriteriaId":"0305D9A0-C145-42FD-9630-E0DD2057FE9C"}]}]}],"references":[{"url":"https://github.com/backstage/backstage/security/advisories/GHSA-5j94-f3mf-8685","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}