{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:55:17.979","vulnerabilities":[{"cve":{"id":"CVE-2024-55878","sourceIdentifier":"security-advisories@github.com","published":"2024-12-12T20:15:21.493","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SimpleXLSX is software for parsing and retrieving data from Excel XLSx files. Starting in version 1.0.12 and prior to version 1.1.12, when calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code. Version 1.1.12 fixes the issue. As a workaround, don't use direct publication via toHTMLEx."},{"lang":"es","value":"SimpleXLSX es un software para analizar y recuperar datos de archivos XLSx de Excel. A partir de la versión 1.0.12 y anteriores a la versión 1.1.12, al llamar al método extendido toHTMLEx, es posible ejecutar código JavaScript arbitrario. La versión 1.1.12 soluciona el problema. Como workaround, no utilice la publicación directa a través de toHTMLEx."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://github.com/shuchkin/simplexlsx/commit/cb4e716259e83d18e89292a4f1b721f4d34e28c2","source":"security-advisories@github.com"},{"url":"https://github.com/shuchkin/simplexlsx/security/advisories/GHSA-x6mh-rjwm-8ph7","source":"security-advisories@github.com"}]}}]}