{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:25:41.101","vulnerabilities":[{"cve":{"id":"CVE-2025-30349","sourceIdentifier":"cve@mitre.org","published":"2025-03-21T17:15:40.853","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to account takeover via a crafted text/html e-mail message with an onerror attribute (that may use base64-encoded JavaScript code), as exploited in the wild in March 2025."},{"lang":"es","value":"Horde IMP hasta la versión 6.2.27, tal como se usa con Horde Application Framework hasta la versión 5.2.23, permite XSS que lleva al robo de cuentas a través de un mensaje de correo electrónico de texto/html manipulado con un atributo onerror (que puede usar código JavaScript codificado en base64), como se explotó en la naturaleza en marzo de 2025."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.7}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://github.com/horde/base/releases/tag/v5.2.23","source":"cve@mitre.org"},{"url":"https://github.com/horde/imp/blob/fd9212ca3b72ff834504af4886f7d95138619bd4/doc/INSTALL.rst?plain=1#L23-L25","source":"cve@mitre.org"},{"url":"https://github.com/horde/imp/blob/fd9212ca3b72ff834504af4886f7d95138619bd4/doc/INSTALL.rst?plain=1#L61-L62","source":"cve@mitre.org"},{"url":"https://github.com/horde/imp/releases/tag/v6.2.27","source":"cve@mitre.org"},{"url":"https://github.com/horde/webmail/releases/tag/v5.2.22","source":"cve@mitre.org"},{"url":"https://github.com/natasaka/CVE-2025-30349/","source":"cve@mitre.org"},{"url":"https://lists.horde.org/archives/imp/Week-of-Mon-20250317/057781.html","source":"cve@mitre.org"},{"url":"https://lists.horde.org/archives/imp/Week-of-Mon-20250317/057784.html","source":"cve@mitre.org"},{"url":"https://web.archive.org/web/20250321152616/https://lists.horde.org/archives/imp/Week-of-Mon-20250317/057781.html","source":"cve@mitre.org"},{"url":"https://web.archive.org/web/20250321162434/https://lists.horde.org/archives/imp/Week-of-Mon-20250317/057784.html","source":"cve@mitre.org"},{"url":"https://www.horde.org/apps/horde","source":"cve@mitre.org"},{"url":"https://www.horde.org/apps/imp","source":"cve@mitre.org"},{"url":"https://www.horde.org/download/horde","source":"cve@mitre.org"},{"url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00008.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}