{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T18:25:02.463","vulnerabilities":[{"cve":{"id":"CVE-2025-55006","sourceIdentifier":"security-advisories@github.com","published":"2025-08-09T03:15:47.177","lastModified":"2025-10-06T20:18:18.127","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Frappe Learning is a learning system that helps users structure their content. In versions 2.33.0 and below, the image upload functionality did not adequately sanitize uploaded SVG files. This allowed users to upload SVG files containing embedded JavaScript or other potentially malicious content. Malicious SVG files could be used to execute arbitrary scripts in the context of other users. A fix for this issue is planned for version 2.34.0."},{"lang":"es","value":"Frappe Learning es un sistema de aprendizaje que ayuda a los usuarios a estructurar su contenido. En las versiones 2.33.0 y anteriores, la función de carga de imágenes no depuraba adecuadamente los archivos SVG subidos. Esto permitía a los usuarios subir archivos SVG con JavaScript incrustado u otro contenido potencialmente malicioso. Los archivos SVG maliciosos podían usarse para ejecutar scripts arbitrarios en el contexto de otros usuarios. Se prevé una solución para este problema en la versión 2.34.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frappe:learning:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.34.0","matchCriteriaId":"3B698344-4EBB-4DAE-A711-6A455247EEEB"}]}]}],"references":[{"url":"https://github.com/frappe/lms/security/advisories/GHSA-mvxw-r9x4-3vrr","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}