{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:27:26.394","vulnerabilities":[{"cve":{"id":"CVE-2025-27146","sourceIdentifier":"security-advisories@github.com","published":"2025-02-25T20:15:38.030","lastModified":"2025-03-04T20:43:22.367","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. The vulnerability has been patched in matrix-appservice-irc version 3.0.4."},{"lang":"es","value":"matrix-appservice-irc es un puente IRC de Node.js para Matrix. El puente matrix-appservice-irc hasta la versión 3.0.3 contiene una vulnerabilidad que puede provocar la ejecución arbitraria de comandos IRC como usuario títere. El atacante solo puede inyectar comandos ejecutados como su propio usuario IRC. La vulnerabilidad ha sido corregida en la versión 3.0.4 de matrix-appservice-irc."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","baseScore":2.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-77"},{"lang":"en","value":"CWE-88"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matrix:matrix_irc_bridge:*:*:*:*:*:node.js:*:*","versionEndExcluding":"3.0.4","matchCriteriaId":"16647423-A332-4AFB-8162-6A4DC3783AAC"}]}]}],"references":[{"url":"https://github.com/matrix-org/matrix-appservice-irc/commit/74f02c8e11f16ed1b355700092c1aa9c036a11bd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-5mvm-89c9-9gm5","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}