{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:07:46.044731200Z","vulnerabilities":[{"cve":{"id":"CVE-2025-29153","sourceIdentifier":"cve@mitre.org","published":"2025-05-07T14:15:42.493","lastModified":"2025-07-09T01:30:45.633","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SQL Injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the Data export, filters functions."},{"lang":"es","value":"La vulnerabilidad de inyección SQL en lemeconsultoria HCM galera.app v.4.58.0 permite a un atacante ejecutar código arbitrario a través de las funciones de exportación de datos y filtros."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lemeconsultoria:galera:4.58.0:*:*:*:*:*:*:*","matchCriteriaId":"8804A6B8-AD9F-4A16-858B-AA9DA282675B"}]}]}],"references":[{"url":"https://wellington-almeida.medium.com/poc-sql-391c437c3960","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://worzyus.medium.com/391c437c3960","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://wellington-almeida.medium.com/poc-sql-391c437c3960","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}