{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:33:20.426","vulnerabilities":[{"cve":{"id":"CVE-2025-30474","sourceIdentifier":"security@apache.org","published":"2025-03-23T15:15:14.103","lastModified":"2025-07-14T18:13:56.103","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS.\n\nThe FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message\nThis issue affects Apache Commons VFS: before 2.10.0.\n\nUsers are recommended to upgrade to version 2.10.0, which fixes the issue."},{"lang":"es","value":"Vulnerabilidad de exposición de información confidencial a un agente no autorizado en Apache Commons VFS. La clase FtpFileObject puede generar una excepción cuando no se encuentra un archivo, revelando la URI original en su mensaje, que puede incluir una contraseña. La solución consiste en ocultar la contraseña en el mensaje de excepción. Este problema afecta a Apache Commons VFS anteriores a la versión 2.10.0. Se recomienda actualizar a la versión 2.10.0, que soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":3.4}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:commons_vfs:*:*:*:*:*:*:*:*","versionEndExcluding":"2.10.0","matchCriteriaId":"4BABF8CF-5800-484E-9B46-701503CA903B"}]}]}],"references":[{"url":"https:\/\/issues.apache.org\/jira\/browse\/VFS-169","source":"security@apache.org","tags":["Issue Tracking","Patch"]},{"url":"https:\/\/lists.apache.org\/thread\/w6ztgnbk6ccry3470x191g3xwrpgy6f4","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2025\/03\/23\/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]}]}}]}