{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:42:25.583","vulnerabilities":[{"cve":{"id":"CVE-2025-48379","sourceIdentifier":"security-advisories@github.com","published":"2025-07-01T19:15:27.353","lastModified":"2025-10-15T20:03:42.337","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. This issue has been patched in version 11.3.0."},{"lang":"es","value":"Pillow es una librería de imágenes de Python. En las versiones 11.2.0 y anteriores a la 11.3.0, se produce un desbordamiento del búfer de montón al escribir una imagen suficientemente grande (más de 64k codificada con la configuración predeterminada) en formato DDS, debido a que se escribe en un búfer sin comprobar el espacio disponible. Esto solo afecta a los usuarios que guardan datos no confiables como una imagen DDS comprimida. Este problema se ha corregido en la versión 11.3.0. "}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-122"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:python:pillow:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"15F219D5-60A5-47BB-B062-F6B310B53376"}]}]}],"references":[{"url":"https://github.com/python-pillow/Pillow/commit/ef98b3510e3e4f14b547762764813d7e5ca3c5a4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/python-pillow/Pillow/pull/9041","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/python-pillow/Pillow/releases/tag/11.3.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/python-pillow/Pillow/security/advisories/GHSA-xg8h-j46f-w952","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}