{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:33:34.422","vulnerabilities":[{"cve":{"id":"CVE-2025-49825","sourceIdentifier":"security-advisories@github.com","published":"2025-06-17T22:15:49.917","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch."},{"lang":"es","value":"Teleport proporciona conectividad, autenticación, controles de acceso y auditoría para la infraestructura. Las versiones de Community Edition anteriores a la 17.5.1 (incluida) son vulnerables a la omisión de la autenticación remota. Al momento de la publicación, no hay un parche de código abierto disponible."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"references":[{"url":"https://github.com/gravitational/teleport/security/advisories/GHSA-8cqv-pj7f-pwpc","source":"security-advisories@github.com"}]}}]}