{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T11:47:31.284","vulnerabilities":[{"cve":{"id":"CVE-2024-8551","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:43.097","lastModified":"2025-08-01T12:44:30.457","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially leading to the exposure or modification of sensitive information such as configuration files, API keys, and hardcoded passwords."},{"lang":"es","value":"Existe una vulnerabilidad de path traversal en las funciones de guardado y carga de flujos de trabajo de las versiones de modelscope/agentscope anteriores a la corrección. Esta vulnerabilidad permite a un atacante leer y escribir archivos JSON arbitrarios en el sistema de archivos, lo que podría provocar la exposición o modificación de información confidencial, como archivos de configuración, claves de API y contraseñas codificadas."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:modelscope:agentscope:-:*:*:*:*:*:*:*","matchCriteriaId":"92143DF7-61A1-4237-920B-62F41963AF9C"}]}]}],"references":[{"url":"https://huntr.com/bounties/e0c0c294-f1e2-4f2c-a632-a9be9fd06989","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}