{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T06:33:08.019","vulnerabilities":[{"cve":{"id":"CVE-2025-27378","sourceIdentifier":"4760f414-e1ae-4ff1-bdad-c7a9c3538b79","published":"2026-01-22T01:15:51.077","lastModified":"2026-02-26T21:25:32.770","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to inject and execute arbitrary SQL queries."},{"lang":"es","value":"AES contiene una vulnerabilidad de inyección SQL debido a una configuración inactiva que impide que se aplique la lógica de análisis SQL más reciente. Cuando esta configuración no está habilitada, la entrada manipulada puede ser manejada incorrectamente, permitiendo a los atacantes inyectar y ejecutar consultas SQL arbitrarias."}],"metrics":{"cvssMetricV31":[{"source":"4760f414-e1ae-4ff1-bdad-c7a9c3538b79","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"4760f414-e1ae-4ff1-bdad-c7a9c3538b79","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:altium:on-prem_enterprise_server:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.3","versionEndExcluding":"7.0.6","matchCriteriaId":"3F31D6A7-989F-4647-AA13-38737112E369"}]}]}],"references":[{"url":"https://www.altium.com/platform/security-compliance/security-advisories","source":"4760f414-e1ae-4ff1-bdad-c7a9c3538b79","tags":["Vendor Advisory"]}]}}]}