{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T15:06:41.780","vulnerabilities":[{"cve":{"id":"CVE-2025-1461","sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","published":"2025-05-28T18:15:25.953","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."},{"lang":"es","value":"La neutralización incorrecta del valor de la propiedad 'eventMoreText' del componente 'VCalendar' en Vuetify permite la inserción de HTML no saneado en la página. Esto puede provocar un ataque de Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss. La vulnerabilidad se produce porque el traductor predeterminado de Vuetify devolverá la clave de traducción como traducción si no encuentra una traducción real. Este problema afecta a las versiones de Vuetify superiores o iguales a la 2.0.0 y anteriores a la 3.0.0. Nota: La versión 2.x de Vuetify ha finalizado su ciclo de vida y no recibirá actualizaciones para solucionar este problema. Para más información, consulte https://v2.vuetifyjs.com/en/about/eol/."}],"metrics":{"cvssMetricV31":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.4}]},"weaknesses":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461","source":"36c7be3b-2937-45df-85ea-ca7133ea542c"},{"url":"https://www.herodevs.com/vulnerability-directory/cve-2025-1461","source":"36c7be3b-2937-45df-85ea-ca7133ea542c"}]}}]}