{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:11:54.979","vulnerabilities":[{"cve":{"id":"CVE-2025-0473","sourceIdentifier":"cve-coordination@incibe.es","published":"2025-01-16T13:15:07.540","lastModified":"2025-05-07T16:23:45.040","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the ‘/pmb/authorities/import/iimport_authorities’ endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to ‘/pmb/authorities/import/iimport_authorities’. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted."},{"lang":"es","value":"Vulnerabilidad en la plataforma PMB que permite a un atacante conservar archivos temporales en el servidor, afectando a las versiones 4.0.10 y posteriores. Esta vulnerabilidad existe en la funcionalidad de carga de archivos en el endpoint ‘/pmb/authorities/import/iimport_authorities’. Cuando se carga un archivo a través de este recurso, el servidor creará un archivo temporal que se eliminará después de que el cliente envíe una solicitud POST a ‘/pmb/authorities/import/iimport_authorities’. Este workflow está automatizado por el cliente web, sin embargo, un atacante puede atrapar y lanzar la segunda solicitud POST para evitar que se elimine el archivo temporal."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-459"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.10","matchCriteriaId":"A6401CB3-4434-4086-AA89-E1326CED5673"}]}]}],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform","source":"cve-coordination@incibe.es","tags":["Third Party Advisory"]}]}}]}