{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:30:13.483","vulnerabilities":[{"cve":{"id":"CVE-2025-46652","sourceIdentifier":"cve@mitre.org","published":"2025-04-26T18:15:31.297","lastModified":"2025-10-24T20:16:19.923","vulnStatus":"Awaiting Analysis","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content."},{"lang":"es","value":"En IZArc hasta la versión 4.5, existe una vulnerabilidad de omisión de la marca de la web. Cuando un usuario realiza una extracción de un archivo comprimido con la marca de la web, esta no se propaga a los archivos extraídos."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-830"}]}],"references":[{"url":"https:\/\/github.com\/EnisAksu\/Argonis\/blob\/main\/CVEs\/IZArc\/IZArc%20Mark-of-the-Web%20Bypass%20Vulnerability.md","source":"cve@mitre.org"},{"url":"https:\/\/github.com\/EnisAksu\/Argonis\/security\/advisories\/GHSA-637g-8v47-79mv","source":"cve@mitre.org"},{"url":"https:\/\/www.izarc.org\/news","source":"cve@mitre.org"}]}}]}