{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T07:06:04.995","vulnerabilities":[{"cve":{"id":"CVE-2025-6002","sourceIdentifier":"cves@blacklanternsecurity.com","published":"2025-06-11T17:15:43.253","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An unrestricted file upload vulnerability exists in the Product Image section of the VirtueMart backend. Authenticated attackers can upload files with arbitrary extensions, including executable or malicious files, potentially leading to remote code execution or other security impacts depending on server configuration."},{"lang":"es","value":"Existe una vulnerabilidad de carga de archivos sin restricciones en la sección Imagen de Producto del backend de VirtueMart. Los atacantes autenticados pueden cargar archivos con extensiones arbitrarias, incluyendo archivos ejecutables o maliciosos, lo que podría provocar la ejecución remota de código u otros problemas de seguridad según la configuración del servidor."}],"metrics":{"cvssMetricV31":[{"source":"cves@blacklanternsecurity.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"cves@blacklanternsecurity.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"references":[{"url":"https://blog.blacklanternsecurity.com/p/doomla-zero-days","source":"cves@blacklanternsecurity.com"}]}}]}