{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T03:36:05.779","vulnerabilities":[{"cve":{"id":"CVE-2025-24361","sourceIdentifier":"security-advisories@github.com","published":"2025-01-25T01:15:24.193","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Nuxt is an open-source web development framework for Vue.js. Source code may be stolen during dev when using version 3.0.0 through 3.15.12 of the webpack builder or version 3.12.2 through 3.152 of the rspack builder and a victim opens a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. By using `Function::toString` against the values in `window.webpackChunknuxt_app`, the attacker can get the source code. Version 3.15.13 of Nuxt patches this issue."},{"lang":"es","value":"Nuxt es un desarrollo web de código abierto framework para Vue.js. El código fuente puede ser robado durante el desarrollo cuando se usa la versión 3.0.0 a la 3.15.12 del generador webpack o la versión 3.12.2 a la 3.152 del generador rspack y una víctima abre un sitio web malicioso. Debido a que la solicitud de la etiqueta script bscriptript clásica no está sujeta a la política del mismo origen, un atacante puede inyectar un script de scripts** en su sitio scriptn el script. Al usar `Function::toString` contra los valores en `window.webpackChunknuxt_app`, el atacante puede obtener el código fuente. La versión 3.15.13 de Nuxt corrige este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-749"}]}],"references":[{"url":"https://github.com/nuxt/nuxt/commit/7eeb910bf4accb1e0193b9178c746f06ad3dd88f","source":"security-advisories@github.com"},{"url":"https://github.com/nuxt/nuxt/security/advisories/GHSA-4gf7-ff8x-hq99","source":"security-advisories@github.com"}]}}]}