{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T16:26:52.078","vulnerabilities":[{"cve":{"id":"CVE-2025-27893","sourceIdentifier":"cve@mitre.org","published":"2025-03-11T09:15:25.457","lastModified":"2025-08-08T13:15:29.537","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. NOTE: the Supplier analyzed the reported exploitation steps and found that, although the user can modify the immutable field, upon switching to View mode the field is reverted to its original value, without anything being saved to the database (and consequently there is no impact)."},{"lang":"es","value":"En Archer Platform 6 a 6.14.00202.10024, un usuario autenticado con privilegios de creación de registros puede manipular campos inmutables, como la fecha de creación, interceptando y modificando una solicitud de copia a través de un URI GenericContent/Record.aspx?id=. Esto permite la modificación no autorizada de metadatos generados por el sistema, lo que compromete la integridad de los datos y potencialmente afecta los controles de auditoría, cumplimiento y seguridad."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":1.8,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.4,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-472"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0.0","versionEndIncluding":"6.14.00202.10024","matchCriteriaId":"0C3617CA-3593-4E00-AFAF-A40F4877267E"}]}]}],"references":[{"url":"https://archerirm.com","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/NastyCrow/CVE-2025-27893","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/NastyCrow/CVE-2025-27893","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}