{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T17:34:37.468","vulnerabilities":[{"cve":{"id":"CVE-2024-56358","sourceIdentifier":"security-advisories@github.com","published":"2024-12-20T21:15:10.673","lastModified":"2025-03-12T17:33:10.120","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust."},{"lang":"es","value":"grist-core es un servidor de alojamiento de hojas de cálculo. Un usuario que visite un documento malicioso y obtenga una vista previa de un archivo adjunto podría ver comprometida su cuenta, ya que el código JavaScript en un archivo SVG se evaluaría en el contexto de su página actual. Este problema se ha solucionado en la versión 1.3.2. Se recomienda a los usuarios que actualicen la versión. Los usuarios que no puedan actualizar la versión deben evitar obtener una vista previa de los archivos adjuntos en documentos preparados por personas en las que no confían."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:getgrist:grist-core:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2","matchCriteriaId":"F9898E10-3477-40DA-BA74-796374CE3880"}]}]}],"references":[{"url":"https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/gristlabs/grist-core/security/advisories/GHSA-jvfm-gf4f-33q3","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}