{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T19:29:57.294","vulnerabilities":[{"cve":{"id":"CVE-2025-55741","sourceIdentifier":"security-advisories@github.com","published":"2025-08-22T16:15:46.087","lastModified":"2025-08-25T17:36:47.337","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. In versions 0.3.0 and earlier, users without the Delete privilege for products are unable to delete individual products via the standard endpoint, as expected. However, these users can bypass intended access controls by issuing requests to the mass-delete endpoint, allowing them to delete products without proper authorization. This vulnerability allows unauthorized product deletion, leading to potential data loss and business disruption. The issue is fixed in version 0.3.1. No known workarounds exist."},{"lang":"es","value":"UnoPim es un sistema de gestión de información de productos (PIM) de código abierto basado en el framework Laravel. En las versiones 0.3.0 y anteriores, los usuarios sin el privilegio de eliminación de productos no pueden eliminar productos individuales a través del endpoint estándar, como se esperaba. Sin embargo, estos usuarios pueden eludir los controles de acceso previstos enviando solicitudes al endpoint de eliminación masiva, lo que les permite eliminar productos sin la debida autorización. Esta vulnerabilidad permite la eliminación no autorizada de productos, lo que puede provocar la pérdida de datos e interrupciones del negocio. El problema se ha corregido en la versión 0.3.1. No existen soluciones alternativas conocidas."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"},{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webkul:unopim:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.1","matchCriteriaId":"8AE1E6BA-5691-4E33-B77B-8548506CEE50"}]}]}],"references":[{"url":"https://github.com/unopim/unopim/commit/c14eebe653aafd8dc713ca729165177e63315989","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://www.youtube.com/watch?v=J_WV8fCXlJM","source":"security-advisories@github.com","tags":["Exploit"]},{"url":"https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]},{"url":"https://www.youtube.com/watch?v=J_WV8fCXlJM","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"]}]}}]}