{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T05:58:11.869","vulnerabilities":[{"cve":{"id":"CVE-2025-53637","sourceIdentifier":"security-advisories@github.com","published":"2025-07-10T22:15:24.580","lastModified":"2025-08-22T16:02:16.093","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Meshtastic is an open source mesh networking solution. The main_matrix.yml GitHub Action is triggered by the pull_request_target event, which has extensive permissions, and can be initiated by an attacker who forked the repository and created a pull request. In the shell code execution part, user-controlled input is interpolated unsafely into the code. If this were to be exploited, attackers could inject unauthorized code into the repository. This vulnerability is fixed in 2.6.6."},{"lang":"es","value":"Meshtastic es una solución de red en malla de código abierto. La acción de GitHub main_matrix.yml se activa mediante el evento pull_request_target, que cuenta con amplios permisos y puede ser iniciada por un atacante que bifurcó el repositorio y creó una solicitud de extracción. En la ejecución del código de shell, la entrada controlada por el usuario se interpola de forma insegura en el código. Si se explotara esta vulnerabilidad, los atacantes podrían inyectar código no autorizado en el repositorio. Esta vulnerabilidad se corrigió en la versión 2.6.6."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N","baseScore":4.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:meshtastic:meshtastic_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.6.6","matchCriteriaId":"CB44176B-8A75-41E4-BE44-4555A24CCA18"}]}]}],"references":[{"url":"https://github.com/meshtastic/firmware/blob/3fd47d9713e7d1b6866c48cf218e2435741651a2/.github/workflows/main_matrix.yml#L34-L41","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/meshtastic/firmware/security/advisories/GHSA-6mwm-v2vv-pp96","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}