{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T01:50:43.786","vulnerabilities":[{"cve":{"id":"CVE-2025-24876","sourceIdentifier":"cna@sap.com","published":"2025-02-11T01:15:11.887","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The SAP Approuter Node.js package version v16.7.1 and before is vulnerable to Authentication bypass. When trading an authorization code an attacker can steal the session of the victim by injecting malicious payload causing High impact on confidentiality and integrity of the application"},{"lang":"es","value":"El paquete SAP Approuter Node.js versión v16.7.1 y anteriores es vulnerable a la omisión de autenticación. Al intercambiar un código de autorización, un atacante puede robar la sesión de la víctima inyectando payload malicioso, lo que provoca un gran impacto en la confidencialidad y la integridad de la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-302"},{"lang":"en","value":"CWE-1287"}]}],"references":[{"url":"https://me.sap.com/notes/3567974","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com"},{"url":"https://www.npmjs.com/package/@sap/approuter?activeTab=versions","source":"cna@sap.com"}]}}]}