{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T20:05:37.291","vulnerabilities":[{"cve":{"id":"CVE-2025-3753","sourceIdentifier":"security@ubuntu.com","published":"2025-07-17T20:15:29.683","lastModified":"2025-08-26T17:51:21.497","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code."},{"lang":"es","value":"Se ha identificado una vulnerabilidad de ejecución de código en la herramienta \"rosbag\" del Robot Operating System (ROS), que afecta a las distribuciones de ROS Noetic Ninjemys y anteriores. La vulnerabilidad surge del uso de la función eval() para procesar la entrada no depurada proporcionada por el usuario en el comando \"rosbag filter\". Esta falla permite a los atacantes manipular y ejecutar código Python arbitrario."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-95"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:indigo_igloo:*:*:*:*:*:*:*","matchCriteriaId":"0673568E-BE13-4D10-9E7B-57B6D38850B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:kinetic_kame:*:*:*:*:*:*:*","matchCriteriaId":"429E39E2-7812-44F3-B3DB-D82561432B88"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:melodic_morenia:*:*:*:*:*:*:*","matchCriteriaId":"C319FA37-A18B-4706-9B29-827BA81CB5B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:noetic_ninjemys:*:*:*:*:*:*:*","matchCriteriaId":"2F466D1C-796D-4857-BEDF-FA600DF47669"}]}]}],"references":[{"url":"https://www.ros.org/blog/noetic-eol/","source":"security@ubuntu.com","tags":["Product"]}]}}]}