{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T05:46:55.544","vulnerabilities":[{"cve":{"id":"CVE-2025-24900","sourceIdentifier":"security-advisories@github.com","published":"2025-02-11T16:15:51.763","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.\nThe affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating."},{"lang":"es","value":"Concorde, anteriormente conocida como Nexkey, es una bifurcación de la plataforma de microblogging federada Misskey. Debido a la falta de contramedidas CSRF y a una configuración incorrecta de las cookies para la autenticación de MediaProxy, existe una vulnerabilidad que permite eludir la autenticación de MediaProxy. En versiones anteriores a 12.25Q1.1, la cookie de autenticación no tiene el atributo SameSite. Esto permite a un atacante eludir la autenticación de MediaProxy y cargar cualquier imagen sin restricciones en determinadas circunstancias. En versiones anteriores a 12.24Q2.3, esta cookie también se utilizaba para autenticar la página de gestión de la cola de trabajos (bull-board), por lo que también se elude la autenticación bull-board. Esto puede permitir ataques que tengan un impacto significativo en la disponibilidad y la integridad. Las versiones afectadas son demasiado antiguas para estar cubiertas por este aviso, pero los encargados del mantenimiento de Concorde recomiendan encarecidamente no utilizar versiones anteriores. La versión 12.25Q1.1 contiene un parche. No existe un workaround eficaz aparte de actualizar."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"references":[{"url":"https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d","source":"security-advisories@github.com"},{"url":"https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059","source":"security-advisories@github.com"},{"url":"https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87","source":"security-advisories@github.com"}]}}]}