{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:25:33.232","vulnerabilities":[{"cve":{"id":"CVE-2025-30203","sourceIdentifier":"security-advisories@github.com","published":"2025-03-31T16:15:25.473","lastModified":"2025-08-21T22:03:06.790","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8."},{"lang":"es","value":"Tuleap es una suite de código abierto que mejora la gestión del desarrollo de software y la colaboración. Tuleap permite el uso de cross-site scripting (XSS) a través del contenido de las fuentes RSS en los widgets RSS. Un administrador de proyecto o alguien con control sobre una fuente RSS en uso podría aprovechar esta vulnerabilidad para obligar a las víctimas a ejecutar código no controlado. Esta vulnerabilidad está corregida en Tuleap Community Edition 16.5.99.1742562878 y Tuleap Enterprise Edition 16.5-5 y 16.4-8."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.7,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-84"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"16.4-8","matchCriteriaId":"C9A97892-5CD1-4264-BBDE-843B91161A62"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"16.5.99.1742562878","matchCriteriaId":"3D1C190B-9ADD-4E3F-9A43-8ECCE8FB1C94"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"16.5","versionEndExcluding":"16.5-5","matchCriteriaId":"E08117D5-6EA5-490F-B78D-8EFDE5025837"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/54cce3f5e883d16055cb0239e023f48cdf5eb25f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=54cce3f5e883d16055cb0239e023f48cdf5eb25f","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://tuleap.net/plugins/tracker/?aid=42243","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}