{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T08:16:55.825","vulnerabilities":[{"cve":{"id":"CVE-2025-65892","sourceIdentifier":"cve@mitre.org","published":"2025-11-29T04:15:57.367","lastModified":"2025-12-23T16:03:24.960","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Reflected Cross-Site Scripting (rXSS) in krpano before version 1.23.2 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the victim's browser via a crafted URL to the passQueryParameters function with the xml parameter enabled."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:krpano:krpano:*:*:*:*:*:*:*:*","versionEndExcluding":"1.23.2","matchCriteriaId":"4570F76A-F701-4A0F-B606-18A748539333"}]}]}],"references":[{"url":"https://krpano.com/docu/releasenotes/?version=1.23.3","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://krpano.com/forum/wbb/index.php?thread/20554-krpano-1-23-3d-gaussian-splatting-support/&postID=96997#post96997","source":"cve@mitre.org","tags":["Issue Tracking"]}]}}]}