{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T12:37:24.764","vulnerabilities":[{"cve":{"id":"CVE-2025-54316","sourceIdentifier":"cve@mitre.org","published":"2025-07-20T19:15:24.230","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in Logpoint before 7.6.0. When creating reports, attackers can create custom Jinja templates that chained built-in filter functions to generate XSS payloads. These payloads can be rendered by the Logpoint Report Template engine, making it vulnerable to cross-site scripting (XSS) attacks."},{"lang":"es","value":"Se detectó un problema en Logpoint antes de la versión 7.6.0. Al crear informes, los atacantes podían crear plantillas Jinja personalizadas que encadenaban funciones de filtro integradas para generar payloads XSS. El motor de plantillas de informes de Logpoint puede renderizar estas payloads, lo que las hace vulnerables a ataques de cross-site scripting (XSS)."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":2.7}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://servicedesk.logpoint.com/hc/en-us/articles/28685383084317-XSS-vulnerability-in-Report-Templates-using-built-in-Jinja-filter-functions","source":"cve@mitre.org"},{"url":"https://servicedesk.logpoint.com/hc/en-us/sections/7201103730845-Product-Security","source":"cve@mitre.org"}]}}]}