{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T10:35:35.510","vulnerabilities":[{"cve":{"id":"CVE-2025-31103","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-03-31T05:15:16.500","lastModified":"2025-05-13T15:15:19.237","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server."},{"lang":"es","value":"Existe una vulnerabilidad de deserialización de datos no confiables en a-blog CMS. Al procesar una solicitud especialmente manipulada, se pueden almacenar archivos arbitrarios en el servidor donde se ejecuta el producto. Esto puede aprovecharse para ejecutar un script arbitrario en el servidor."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionEndIncluding":"2.8.80","matchCriteriaId":"60F04B77-7245-4462-A93E-B6EABF10070A"},{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.0","versionEndIncluding":"2.9.46","matchCriteriaId":"5E221BFF-CC8F-4CA6-ACF3-259586C36F43"},{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"2.10.0","versionEndExcluding":"2.10.58","matchCriteriaId":"94D68E7F-750D-41C6-A7AF-50B817B5C717"},{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"2.11.0","versionEndExcluding":"2.11.70","matchCriteriaId":"58C9FB4E-2C16-4989-9E08-3AE7BDD80518"},{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.41","matchCriteriaId":"B7985F2B-BF4C-4B00-9988-D184037229A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.37","matchCriteriaId":"666198C0-5D1D-442F-8659-358F7AC09A0B"}]}]}],"references":[{"url":"https://developer.a-blogcms.jp/blog/news/entry-4197.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://developer.a-blogcms.jp/blog/news/security-update202503.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN66982699/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]}]}}]}