{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T00:48:31.529","vulnerabilities":[{"cve":{"id":"CVE-2025-22888","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-02-19T06:15:21.687","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser."},{"lang":"es","value":"El tipo móvil contiene una vulnerabilidad Cross-Site Scripting Almacenado en la página de edición de bloque personalizado del editor de bloques MT. Si se explota, un script arbitrario puede ejecutarse en el navegador web de un usuario iniciado."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN48742353/","source":"vultures@jpcert.or.jp"},{"url":"https://www.movabletype.org/news/2025/02/mt-842-released.html","source":"vultures@jpcert.or.jp"}]}}]}