{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:41:50.376","vulnerabilities":[{"cve":{"id":"CVE-2024-6229","sourceIdentifier":"security@huntr.dev","published":"2024-07-07T16:15:02.013","lastModified":"2024-11-21T09:49:14.513","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability exists in the 'Upload Knowledge' feature of stangirard/quivr, affecting the latest version. Users can upload files via URL, which allows the insertion of malicious JavaScript payloads. These payloads are stored on the server and executed whenever any user clicks on a link containing the payload, leading to potential data theft, session hijacking, and reputation damage."},{"lang":"es","value":" Existe una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la función 'Upload Knowledge' de stangirard/quivr, que afecta a la última versión. Los usuarios pueden cargar archivos a través de URL, lo que permite la inserción de payloads de JavaScript maliciosos. Estos payloads se almacenan en el servidor y se ejecutan cada vez que un usuario hace clic en un enlace que contiene el payload, lo que genera un posible robo de datos, secuestro de sesiones y daños a la reputación."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:quivr:quivr:*:*:*:*:*:*:*:*","versionEndIncluding":"0.0.281","matchCriteriaId":"722DE352-4E03-4519-BDB9-2DC6C56D4A83"}]}]}],"references":[{"url":"https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786","source":"security@huntr.dev","tags":["Exploit"]},{"url":"https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}