{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T04:53:22.649","vulnerabilities":[{"cve":{"id":"CVE-2025-31138","sourceIdentifier":"security-advisories@github.com","published":"2025-04-07T15:15:44.047","lastModified":"2025-10-21T13:55:56.330","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where user-controlled inputs for element dimensions (width and height) were not properly validated. This allowed an attacker with direct access to the site's source code or a CMS plugin to set values like 100%;height:100%;position:fixed;, potentially covering the entire viewport and facilitating clickjacking attacks. An attacker with high privileges could exploit this vulnerability to overlay malicious UI elements on top of legitimate content, trick users into interacting with hidden elements (clickjacking), or disrupt the intended functionality and accessibility of the website. This vulnerability is fixed in 1.20.1."},{"lang":"es","value":"tarteaucitron.js es un banner de cookies compatible y accesible. Se identificó una vulnerabilidad en tarteaucitron.js antes de la versión 1.20.1, donde las entradas controladas por el usuario para las dimensiones de los elementos (ancho y alto) no se validaban correctamente. Esto permitía a un atacante con acceso directo al código fuente del sitio o a un complemento de CMS establecer valores como 100%;height:100%;position:fixed;, lo que podría cubrir toda la ventana gráfica y facilitar ataques de clickjacking. Un atacante con privilegios elevados podría explotar esta vulnerabilidad para superponer elementos maliciosos de la interfaz de usuario sobre contenido legítimo, engañar a los usuarios para que interactúen con elementos ocultos (clickjacking) o interrumpir la funcionalidad y la accesibilidad previstas del sitio web. Esta vulnerabilidad se corrigió en la versión 1.20.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1021"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:amauri:tarteaucitronjs:*:*:*:*:*:node.js:*:*","versionEndExcluding":"1.20.1","matchCriteriaId":"ECAC1B54-E872-41FB-841F-E8590B2A9512"}]}]}],"references":[{"url":"https://github.com/AmauriC/tarteaucitron.js/commit/25fcf828aaa55306ddc09cfbac9a6f8f126e2d07","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/AmauriC/tarteaucitron.js/security/advisories/GHSA-7524-3396-fqv3","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}