{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:09:08.577","vulnerabilities":[{"cve":{"id":"CVE-2025-55288","sourceIdentifier":"security-advisories@github.com","published":"2025-08-18T17:15:31.067","lastModified":"2025-09-03T16:11:31.837","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Genealogy is a family tree PHP application. Prior to 4.4.0, Authenticated Reflected Cross-Site Scripting (XSS) vulnerability was identified in the Genealogy application. Authenticated attackers could run arbitrary JavaScript in another user’s session, leading to session hijacking, data theft, and UI manipulation. This vulnerability is fixed in 4.4.0."},{"lang":"es","value":"Genealogy es una aplicación PHP de árbol genealógico. Antes de la versión 4.4.0, se identificó una vulnerabilidad de Cross-Site Scripting (XSS) reflejado y autenticada en la aplicación Genealogy. Los atacantes autenticados podían ejecutar JavaScript arbitrario en la sesión de otro usuario, lo que provocaba secuestro de sesión, robo de datos y manipulación de la interfaz de usuario. Esta vulnerabilidad se corrigió en la versión 4.4.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kreaweb:genealogy:*:*:*:*:*:*:*:*","versionEndExcluding":"4.4.0","matchCriteriaId":"DD0549F0-B7AF-46DE-90A7-D8635A75836E"}]}]}],"references":[{"url":"https://github.com/MGeurts/genealogy/commit/1683b3cbea5e52c99291fa231b7bc8c33f33c33f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/MGeurts/genealogy/security/advisories/GHSA-3h8x-g9xj-rhwg","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}