{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T19:08:22.958","vulnerabilities":[{"cve":{"id":"CVE-2025-54122","sourceIdentifier":"security-advisories@github.com","published":"2025-07-21T21:15:26.237","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Manager-io/Manager is accounting software. A critical unauthenticated full read Server-Side Request Forgery (SSRF) vulnerability has been identified in the proxy handler component of both manager Desktop and Server edition versions up to and including 25.7.18.2519. This vulnerability allows an unauthenticated attacker to bypass network isolation and access restrictions, potentially enabling access to internal services, cloud metadata endpoints, and exfiltration of sensitive data from isolated network segments. This vulnerability is fixed in version 25.7.21.2525."},{"lang":"es","value":"Manager-io/Manager es un software de contabilidad. Se ha identificado una vulnerabilidad crítica de Server-Side Request Forgery (SSRF) de lectura completa no autenticada en el componente de gestión de proxy de las ediciones manager Desktop y Server hasta la 25.7.18.2519 incluida. Esta vulnerabilidad permite a un atacante no autenticado eludir el aislamiento de la red y las restricciones de acceso, lo que podría permitir el acceso a servicios internos, endpoints de metadatos en la nube y la exfiltración de datos confidenciales de segmentos de red aislados. Esta vulnerabilidad está corregida en la versión 25.7.21.2525."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"references":[{"url":"https://github.com/Manager-io/Manager/security/advisories/GHSA-347w-cgwh-m895","source":"security-advisories@github.com"}]}}]}