{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T09:09:59.178","vulnerabilities":[{"cve":{"id":"CVE-2025-6967","sourceIdentifier":"iletisim@usom.gov.tr","published":"2026-02-10T14:16:09.607","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"es","value":"Vulnerabilidad de Ejecución Después de Redirección (EAR) en el CMS de Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. permite el Secuestro de JSON (también conocido como Secuestro de JavaScript), omisión de autenticación. Este problema afecta al CMS: hasta el 10022026.\n\nNOTA: El proveedor fue contactado con antelación sobre esta divulgación, pero no respondió de ninguna manera."}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.8}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-698"}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-26-0050","source":"iletisim@usom.gov.tr"}]}}]}