{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T15:26:15.303","vulnerabilities":[{"cve":{"id":"CVE-2024-47881","sourceIdentifier":"security-advisories@github.com","published":"2024-10-24T21:15:12.957","lastModified":"2024-10-28T14:14:02.157","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenRefine is a free, open source tool for working with messy data. Starting in version 3.4-beta and prior to version 3.8.3, in the `database` extension, the \"enable_load_extension\" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. Version 3.8.3 fixes this issue."},{"lang":"es","value":"OpenRefine es una herramienta gratuita de código abierto para trabajar con datos desordenados. A partir de la versión 3.4-beta y antes de la versión 3.8.3, en la extensión `database`, se puede configurar la propiedad \"enable_load_extension\" para la integración de SQLite, lo que permite a un atacante cargar DLL de extensión (locales o remotas) y, por lo tanto, ejecutar código arbitrario en el servidor. El atacante debe tener acceso de red a la instancia de OpenRefine. La versión 3.8.3 corrige este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"3.8.3","matchCriteriaId":"3696DAE5-12CF-4A81-B05D-970126B0410D"}]}]}],"references":[{"url":"https://github.com/OpenRefine/OpenRefine/commit/853a1d91662e7dc278a9a94a38be58de04494056","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-87cf-j763-vvh8","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]}]}}]}