{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T17:16:13.577","vulnerabilities":[{"cve":{"id":"CVE-2025-2396","sourceIdentifier":"twcert@cert.org.tw","published":"2025-03-17T06:15:26.113","lastModified":"2025-11-18T17:45:59.737","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The U-Office Force from e-Excellence has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server."},{"lang":"es","value":"U-Office Force de e-Excellence tiene una vulnerabilidad de carga de archivos arbitraria, que permite a atacantes remotos con privilegios regulares cargar y ejecutar puertas traseras de shell web, lo que habilita la ejecución de código arbitrario en el servidor."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:edetw:u-office_force:*:*:*:*:*:*:*:*","versionEndExcluding":"28.0","matchCriteriaId":"CC2F81D9-17D8-4FE1-8048-D68364527CC5"}]}]}],"references":[{"url":"https://www.twcert.org.tw/en/cp-139-10014-69aa5-2.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-10013-0d371-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]}]}}]}