{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:29:23.661","vulnerabilities":[{"cve":{"id":"CVE-2025-68134","sourceIdentifier":"security-advisories@github.com","published":"2026-01-21T19:16:04.510","lastModified":"2026-02-06T21:21:42.600","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"EVerest is an EV charging software stack. Prior to version 2025.10.0, the use of the `assert` function to handle errors frequently causes the module to crash. This is particularly critical because the manager shuts down all other modules and exits when any one of them terminates, leading to a denial of service. In a context where a manager handles multiple EVSE, this would also impact other users. Version 2025.10.0 fixes the issue."},{"lang":"es","value":"EVerest es una pila de software de carga de vehículos eléctricos. Antes de la versión 2025.10.0, el uso de la función `assert` para manejar errores frecuentemente causa que el módulo se bloquee. Esto es particularmente crítico porque el gestor apaga todos los demás módulos y sale cuando cualquiera de ellos termina, lo que lleva a una denegación de servicio. En un contexto donde un gestor maneja múltiples EVSE, esto también impactaría a otros usuarios. La versión 2025.10.0 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*","versionEndExcluding":"2025.10.0","matchCriteriaId":"94E1768A-FED9-477E-A4B7-99FD10058D23"}]}]}],"references":[{"url":"https://github.com/EVerest/everest-core/security/advisories/GHSA-cxc5-rrj5-8pf3","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}