{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:42:11.460","vulnerabilities":[{"cve":{"id":"CVE-2025-67083","sourceIdentifier":"cve@mitre.org","published":"2026-01-15T15:15:51.313","lastModified":"2026-01-22T16:03:54.193","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server and its configuration."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en InvoicePlane hasta 1.6.3 permite a atacantes no autenticados leer archivos del servidor. La capacidad de leer archivos y el tipo de archivo depende del servidor web y su configuración."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.4","matchCriteriaId":"17C261C3-0A6B-4D07-8370-DD3C71097DE2"}]}]}],"references":[{"url":"https://github.com/InvoicePlane/InvoicePlane","source":"cve@mitre.org","tags":["Product"]},{"url":"https://www.helx.io/blog/advisory-invoice-plane/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}