{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:03:03.943","vulnerabilities":[{"cve":{"id":"CVE-2025-24841","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-02-19T06:15:21.853","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Movable Type contains a stored cross-site scripting vulnerability in the HTML edit mode of MT Block Editor. It is exploitable when TinyMCE6 is used as a rich text editor and an arbitrary script may be executed on a logged-in user's web browser."},{"lang":"es","value":"El tipo móvil contiene una vulnerabilidad Cross-Site Scripting Almacenado en el modo de edición HTML del editor de bloques MT. Es explotable cuando TinyMCE6 se usa como un editor de texto rico y un arbitrary script puede ejecutarse en el navegador web de un usuario conectado."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN48742353/","source":"vultures@jpcert.or.jp"},{"url":"https://www.movabletype.org/news/2025/02/mt-842-released.html","source":"vultures@jpcert.or.jp"}]}}]}