{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:18:51.163","vulnerabilities":[{"cve":{"id":"CVE-2025-52203","sourceIdentifier":"cve@mitre.org","published":"2025-07-31T16:15:31.423","lastModified":"2025-08-06T16:18:51.437","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel \"automatically upon authentication the malicious script executes in the user's browser context."},{"lang":"es","value":"Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en DevaslanPHP project-management v1.2.4. La vulnerabilidad reside en el campo \"Nombre del ticket\", que no depura correctamente la información proporcionada por el usuario. Un atacante autenticado puede inyectar payloads de JavaScript maliciosas en este campo, que posteriormente se almacenan en la base de datos. Cuando un usuario legítimo inicia sesión y es redirigido al panel del usuario, tras la autenticación, el script malicioso se ejecuta automáticamente en el contexto del navegador del usuario."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.7}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:devaslanphp:project_management:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"219406D9-A6C0-430D-90DC-DD224EDD362B"}]}]}],"references":[{"url":"https://github.com/devaslanphp/project-management/releases","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://github.com/ischyr/research-and-development/tree/main/CVE-2025-52203","source":"cve@mitre.org","tags":["Exploit"]}]}}]}