{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:44:43.652","vulnerabilities":[{"cve":{"id":"CVE-2025-26865","sourceIdentifier":"security@apache.org","published":"2025-03-10T14:15:25.220","lastModified":"2025-06-23T18:37:09.027","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.  \n\nIt's a regression between 18.12.17 and 18.12.18.\nIn case you use something like that, which is not recommended!\nFor security, only official releases should be used.\n\nIn other words, if you use 18.12.17 you are still safe.\nThe version 18.12.17 is not a affected.\nBut something between 18.12.17 and 18.12.18 is.\n\nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue."},{"lang":"es","value":"Vulnerabilidad de neutralización inadecuada de elementos especiales utilizados en un motor de plantillas en Apache OFBiz. Este problema afecta a Apache OFBiz: desde la versión 18.12.17 hasta la 18.12.18. Es una regresión entre la 18.12.17 y la 18.12.18. En caso de que utilices algo así, ¡lo cual no se recomienda! Por seguridad, solo se deben utilizar las versiones oficiales. En otras palabras, si utilizas la 18.12.17, aún estás a salvo. La versión 18.12.17 no está afectada. Pero algo entre la 18.12.17 y la 18.12.18 sí lo está. En ese caso, se recomienda a los usuarios que actualicen a la versión 18.12.18, que soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":2.5}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-1336"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:ofbiz:18.12.17:*:*:*:*:*:*:*","matchCriteriaId":"C07CBDF9-F52E-4C71-BDA4-F431FE8F24F0"}]}]}],"references":[{"url":"https://issues.apache.org/jira/browse/OFBIZ-12594","source":"security@apache.org","tags":["Issue Tracking","Patch"]},{"url":"https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://ofbiz.apache.org/download.html","source":"security@apache.org","tags":["Product"]},{"url":"https://ofbiz.apache.org/security.html","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/03/07/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]}]}}]}