{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T18:01:59.544","vulnerabilities":[{"cve":{"id":"CVE-2024-56357","sourceIdentifier":"security-advisories@github.com","published":"2024-12-20T21:15:10.483","lastModified":"2025-03-12T17:36:08.460","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust."},{"lang":"es","value":"grist-core es un servidor de alojamiento de hojas de cálculo. Un usuario que visite un documento malicioso o envíe un formulario malicioso podría ver comprometida su cuenta, ya que era posible usar el esquema `javascript:` con URL de widgets personalizados y URL de redireccionamiento de formularios. Este problema se ha solucionado en la versión 1.3.1. Se recomienda a los usuarios que actualicen la versión. Los usuarios que no puedan actualizar deben evitar visitar documentos o formularios preparados por personas en las que no confíen."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:getgrist:grist-core:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.1","matchCriteriaId":"4567BBCE-DB4D-4648-A39B-637AC71B1564"}]}]}],"references":[{"url":"https://github.com/gristlabs/grist-core/commit/10b069005ec8d5f511e6554a56111d8f257f029e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/gristlabs/grist-core/security/advisories/GHSA-cq5q-cqr7-vmf6","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}