{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:22:45.890","vulnerabilities":[{"cve":{"id":"CVE-2024-8954","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:44.967","lastModified":"2025-07-15T15:49:09.287","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In composiohq/composio version 0.5.10, the API does not validate the `x-api-key` header's value during the authentication step. This vulnerability allows an attacker to bypass authentication by providing any random value in the `x-api-key` header, thereby gaining unauthorized access to the server."},{"lang":"es","value":"En la versión 0.5.10 de composiohq/composio, la API no valida el valor del encabezado `x-api-key` durante la autenticación. Esta vulnerabilidad permite a un atacante eludir la autenticación proporcionando cualquier valor aleatorio en el encabezado `x-api-key`, obteniendo así acceso no autorizado al servidor."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-304"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:composio:composio:0.5.10:*:*:*:*:*:*:*","matchCriteriaId":"16BBA4B7-B241-4F91-9DE3-A51BCD774F87"}]}]}],"references":[{"url":"https://huntr.com/bounties/f1e0fdce-00d7-4261-a466-923062800b12","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}