{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T22:22:20.631","vulnerabilities":[{"cve":{"id":"CVE-2025-55745","sourceIdentifier":"security-advisories@github.com","published":"2025-08-22T17:15:35.647","lastModified":"2025-08-25T17:35:21.020","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Versions 0.3.0 and prior are vulnerable to CSV injection, also known as formula injection, in the Quick Export feature. This vulnerability allows attackers to inject malicious content into exported CSV files. When the CSV file is opened in spreadsheet applications such as Microsoft Excel, the malicious input may be interpreted as a formula or command, potentially resulting in the execution of arbitrary code on the victim's device. Successful exploitation can lead to remote code execution, including the establishment of a reverse shell. Users are advised to upgrade to version 0.3.1 or later."},{"lang":"es","value":"UnoPim es un sistema de gestión de información de productos (PIM) de código abierto basado en el framework Laravel. Las versiones 0.3.0 y anteriores son vulnerables a la inyección de CSV, también conocida como inyección de fórmulas, en la función de exportación rápida. Esta vulnerabilidad permite a los atacantes inyectar contenido malicioso en archivos CSV exportados. Al abrir el archivo CSV en aplicaciones de hoja de cálculo como Microsoft Excel, la entrada maliciosa puede interpretarse como una fórmula o un comando, lo que podría provocar la ejecución de código arbitrario en el dispositivo de la víctima. Una explotación exitosa puede provocar la ejecución remota de código, incluyendo el establecimiento de un shell inverso. Se recomienda a los usuarios actualizar a la versión 0.3.1 o posterior."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1236"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webkul:unopim:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.1","matchCriteriaId":"8AE1E6BA-5691-4E33-B77B-8548506CEE50"}]}]}],"references":[{"url":"https://github.com/unopim/unopim/commit/b25db9496fc147842a519d1dd42ec03c3bf00a34","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/unopim/unopim/security/advisories/GHSA-74rg-6f92-g6wx","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}