{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T01:58:30.325","vulnerabilities":[{"cve":{"id":"CVE-2025-21528","sourceIdentifier":"secalert_us@oracle.com","published":"2025-01-21T21:15:18.597","lastModified":"2025-06-18T19:19:45.090","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access).  Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and  23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el producto Primavera P6 Enterprise Project Portfolio Management de Oracle Construction and Engineering (componente: Web Access). Las versiones compatibles afectadas son 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 y 23.12.1.0-23.12.10.0. Esta vulnerabilidad, que se puede explotar fácilmente, permite que un atacante no autenticado con acceso a la red a través de HTTP ponga en peligro Primavera P6 Enterprise Project Portfolio Management. Los ataques exitosos requieren la interacción humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualización, inserción o eliminación no autorizada de algunos datos accesibles de Primavera P6 Enterprise Project Portfolio Management. Puntuación base CVSS 3.1: 4,3 (impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","versionStartIncluding":"20.12.1.0","versionEndIncluding":"20.12.21.5","matchCriteriaId":"B5AFB209-AB96-4090-9028-27E4E61EC80A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","versionStartIncluding":"21.12.1.0","versionEndIncluding":"21.12.20.0","matchCriteriaId":"89DFA0EF-D71E-4D47-891F-173E72CF171E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","versionStartIncluding":"22.12.1.0","versionEndIncluding":"22.12.16.0","matchCriteriaId":"7DC5D1FC-50F4-4C07-A1C2-4BFB88B10F81"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","versionStartIncluding":"23.12.1.0","versionEndIncluding":"23.12.10.0","matchCriteriaId":"C43E4CA0-E641-407B-BA24-5FBA3587F57F"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujan2025.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]}]}}]}