{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T21:40:35.052","vulnerabilities":[{"cve":{"id":"CVE-2025-27134","sourceIdentifier":"security-advisories@github.com","published":"2025-04-30T15:16:00.927","lastModified":"2025-05-16T16:32:35.957","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3."},{"lang":"es","value":"Joplin es una aplicación gratuita y de código abierto para tomar notas y gestionar tareas pendientes, capaz de gestionar un gran número de notas organizadas en cuadernos. Antes de la versión 3.3.3, existía una vulnerabilidad de escalada de privilegios en el servidor Joplin, que permitía a usuarios no administradores explotar el endpoint de la API `PATCH /api/users/:id` para establecer el campo `is_admin` en 1. Esta vulnerabilidad permite a usuarios malintencionados con pocos privilegios realizar acciones administrativas sin la debida autorización. Este problema se ha corregido en la versión 3.3.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*","versionEndExcluding":"3.3.3","matchCriteriaId":"DD591BFD-416F-494A-8CF5-1BE3656CCC27"}]}]}],"references":[{"url":"https://github.com/laurent22/joplin/commit/12baa9827dac9da903f244c9f358e3deb264e228","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/laurent22/joplin/security/advisories/GHSA-xj67-649m-3p8x","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/laurent22/joplin/security/advisories/GHSA-xj67-649m-3p8x","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}