{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:52:26.530","vulnerabilities":[{"cve":{"id":"CVE-2025-48061","sourceIdentifier":"security-advisories@github.com","published":"2025-05-22T17:15:25.033","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"wire-webapp is the web application for the open-source messaging service Wire. A change caused a regression resulting in sessions not being properly invalidated. A user that logged out of the Wire webapp, could have been automatically logged in again after re-opening the application. This does not happen when the user is logged in as a temporary user by selecting \"This is a public computer\" during login or the user selects \"Delete all your personal information and conversations on this device\" upon logout. The underlying issue has been fixed with wire-webapp version 2025-05-20-production.0. As a workaround, this behavior can be prevented by either deleting all information upon logout as well as logging in as a temporary client."},{"lang":"es","value":"wire-webapp es la aplicación web para el servicio de mensajería de código abierto Wire. Un cambio provocó una regresión que impidió que las sesiones se invalidaran correctamente. Un usuario que cerraba sesión en la aplicación web de Wire podría haber vuelto a iniciar sesión automáticamente al reabrirla. Esto no ocurre cuando el usuario inicia sesión como usuario temporal seleccionando \"Este es un equipo público\" al iniciar sesión o seleccionando \"Eliminar toda su información personal y conversaciones en este dispositivo\" al cerrar sesión. El problema subyacente se ha solucionado con la versión 2025-05-20-production.0 de wire-webapp. Como workaround, este comportamiento se puede evitar eliminando toda la información al cerrar sesión o iniciando sesión como cliente temporal."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.3,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-613"}]}],"references":[{"url":"https://github.com/wireapp/wire-webapp/security/advisories/GHSA-7r6m-qjwm-w44q","source":"security-advisories@github.com"}]}}]}