{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T03:58:39.444","vulnerabilities":[{"cve":{"id":"CVE-2025-0162","sourceIdentifier":"psirt@us.ibm.com","published":"2025-03-07T17:15:21.110","lastModified":"2025-03-13T02:22:58.683","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources."},{"lang":"es","value":"IBM Aspera Shares 1.9.9 a 1.10.0 PL7 es vulnerable a un ataque de inyección de entidad externa (XXE) XML al procesar datos XML. Un atacante remoto autenticado podría aprovechar esta vulnerabilidad para exponer información confidencial o consumir recursos de memoria."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.9","versionEndExcluding":"1.10.0","matchCriteriaId":"C166B9E8-FE55-4A53-8DB3-FCC1DA8E3B7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*","matchCriteriaId":"39D4EC3F-C3DB-4866-B1FB-CE44E8F67D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*","matchCriteriaId":"09296CB1-A4C2-4266-B1E6-371A3EE17793"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*","matchCriteriaId":"093500E5-B15F-4935-B570-E0550C680004"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*","matchCriteriaId":"CD806ECB-AE0A-4D28-9F19-C7E803CCC81C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*","matchCriteriaId":"AB8148AE-3573-4E5F-BB8F-ADB5D37D3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*","matchCriteriaId":"38D10CB8-E290-4B6B-8896-7D52A191B8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*","matchCriteriaId":"40E92215-7CE0-4709-9FB5-157EE2736161"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level7:*:*:*:*:*:*","matchCriteriaId":"77A66754-8C69-41E9-9189-852CC54BB387"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7185096","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}