{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T14:03:19.781","vulnerabilities":[{"cve":{"id":"CVE-2025-25235","sourceIdentifier":"de5a6978-88fe-4c27-a7df-d0d5b52d5b52","published":"2025-08-11T22:15:26.693","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks."},{"lang":"es","value":"Server-Side Request Forgery (SSRF) en Omnissa Secure Email Gateway (SEG) en SEG anterior a 2.32 que se ejecuta en Windows y SEG anterior a 2503 que se ejecuta en UAG permite el enrutamiento del tráfico de red, como solicitudes HTTP, a redes internas."}],"metrics":{"cvssMetricV31":[{"source":"de5a6978-88fe-4c27-a7df-d0d5b52d5b52","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"de5a6978-88fe-4c27-a7df-d0d5b52d5b52","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"references":[{"url":"https://www.omnissa.com/omsa-2025-0003/","source":"de5a6978-88fe-4c27-a7df-d0d5b52d5b52"}]}}]}