{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T13:49:26.710","vulnerabilities":[{"cve":{"id":"CVE-2025-23192","sourceIdentifier":"cna@sap.com","published":"2025-06-10T01:15:20.847","lastModified":"2025-10-23T14:30:12.927","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SAP BusinessObjects Business Intelligence (BI Workspace) allows an unauthenticated attacker to craft and store malicious script within a workspace. When the victim accesses the workspace, the script will execute in their browser enabling the attacker to potentially access sensitive session information, modify or make browser information unavailable. This leads to a high impact on confidentiality and low impact on integrity, availability."},{"lang":"es","value":"SAP BusinessObjects Business Intelligence (BI Workspace) permite a un atacante no autenticado manipular y almacenar un script malicioso en un espacio de trabajo. Cuando la víctima accede al espacio de trabajo, el script se ejecuta en su navegador, lo que permite al atacante acceder a información confidencial de la sesión, modificarla o impedir su acceso. Esto afecta gravemente la confidencialidad y reduce la integridad y la disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.7}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:businessobjects_business_intelligence:430:*:*:*:enterprise:*:*:*","matchCriteriaId":"8FAA6380-851B-4A65-A052-CACE8B7E2340"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:businessobjects_business_intelligence:2025:*:*:*:-:*:*:*","matchCriteriaId":"A8184AA4-D6C3-40D9-A6BA-B12C4039F02A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:businessobjects_business_intelligence:2027:*:*:*:-:*:*:*","matchCriteriaId":"09B714C1-C711-4F22-8692-4F5B34DCC609"}]}]}],"references":[{"url":"https://me.sap.com/notes/3560693","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Patch"]}]}}]}