{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T05:21:05.336","vulnerabilities":[{"cve":{"id":"CVE-2025-45854","sourceIdentifier":"cve@mitre.org","published":"2025-06-03T16:15:25.600","lastModified":"2025-08-26T19:15:40.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/server/executeExec of JEHC-BPM 2.0.1 allows attackers to execute arbitrary code via execParams."},{"lang":"es","value":"Una vulnerabilidad de carga de archivos arbitrarios en el componente /server/executeExec de JEHC-BPM v2.0.1 permite a los atacantes ejecutar código arbitrario mediante la carga de un archivo manipulado."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jehc:jehc-bpm:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.1","matchCriteriaId":"0E014503-28AD-4C99-BD5B-4ED1ECB5E961"}]}]}],"references":[{"url":"https://gist.github.com/Cafe-Tea/bc14b38f4bfd951de2979a24c3358460","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://gitee.com/jehc/JEHC-BPM","source":"cve@mitre.org","tags":["Product"]},{"url":"https://web.archive.org/web/20250604134020/https://gist.github.com/Cafe-Tea/bc14b38f4bfd951de2979a24c3358460/revisions","source":"cve@mitre.org","tags":["Patch"]}]}}]}