{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T18:39:18.365","vulnerabilities":[{"cve":{"id":"CVE-2025-49653","sourceIdentifier":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","published":"2025-06-09T18:15:27.033","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Exposure of sensitive data in active sessions in Lablup's BackendAI allows attackers to retrieve credentials for users on the management platform."},{"lang":"es","value":"La exposición de datos confidenciales en sesiones activas en BackendAI de Lablup permite a los atacantes recuperar las credenciales de los usuarios en la plataforma de administración."}],"metrics":{"cvssMetricV31":[{"source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":6.0}]},"weaknesses":[{"source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://hiddenlayer.com/sai_security_advisor/2025-06-backendai/","source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c"}]}}]}