{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:37:07.469","vulnerabilities":[{"cve":{"id":"CVE-2026-21853","sourceIdentifier":"security-advisories@github.com","published":"2026-03-02T19:16:32.560","lastModified":"2026-04-20T14:53:37.203","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.25.4, there is a one-click remote code execution vulnerability. This vulnerability can be exploited by embedding a specially crafted affine: URL on a website. An attacker can trigger the vulnerability in two common scenarios: 1/ A victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or 2/ A victim clicks on a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes AFFiNE custom URL handler, which launches the AFFiNE app and processes the crafted URL. This results in arbitrary code execution on the victim’s machine, without further interaction. This issue has been patched in version 0.25.4."},{"lang":"es","value":"AFFiNE es un espacio de trabajo todo en uno de código abierto y un sistema operativo. Antes de la versión 0.25.4, existe una vulnerabilidad de ejecución remota de código de un solo clic. Esta vulnerabilidad puede ser explotada incrustando una URL affine: especialmente diseñada en un sitio web. Un atacante puede activar la vulnerabilidad en dos escenarios comunes: 1/ Una víctima visita un sitio web malicioso controlado por el atacante y el sitio web redirige automáticamente a la URL, o 2/ Una víctima hace clic en un enlace diseñado incrustado en un sitio web legítimo (p. ej., en contenido generado por el usuario). En ambos casos, el navegador invoca el gestor de URL personalizado de AFFiNE, lo que inicia la aplicación AFFiNE y procesa la URL diseñada. Esto resulta en ejecución de código arbitrario en la máquina de la víctima, sin interacción adicional. Este problema ha sido parcheado en la versión 0.25.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:affine:affine:*:*:*:*:*:*:*:*","versionEndExcluding":"0.25.4","matchCriteriaId":"CCC113D1-6B87-4514-B83A-CB34A9108CD7"}]}]}],"references":[{"url":"https://github.com/toeverything/AFFiNE/commit/c9a4129a3e9376b688c18e1dcd6c87a775caac80","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/toeverything/AFFiNE/pull/13864","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/toeverything/AFFiNE/security/advisories/GHSA-67vm-2mcj-8965","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]}]}}]}