{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:15:50.248","vulnerabilities":[{"cve":{"id":"CVE-2026-24007","sourceIdentifier":"security-advisories@github.com","published":"2026-02-02T23:16:07.500","lastModified":"2026-02-23T20:29:40.347","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap is missing CSRF protection in the Overview inconsistent items. An attacker could use this vulnerability to trick victims into repairing inconsistent items (creating artifact links from the release). This vulnerability is fixed in Tuleap Community Edition 17.0.99.1768924735 and Tuleap Enterprise Edition 17.2-5, 17.1-6, and 17.0-9."},{"lang":"es","value":"Tuleap es una suite de código abierto para la gestión de desarrollo de software y colaboración. Tuleap carece de protección CSRF en los elementos inconsistentes de la Vista general. Un atacante podría usar esta vulnerabilidad para engañar a las víctimas para que reparen elementos inconsistentes (creando enlaces de artefactos desde la versión). Esta vulnerabilidad está corregida en Tuleap Community Edition 17.0.99.1768924735 y Tuleap Enterprise Edition 17.2-5, 17.1-6 y 17.0-9."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"17.0-9","matchCriteriaId":"72563F4A-1F81-4973-A289-F0F6E8E7CBF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"17.0.99.1768924735","matchCriteriaId":"7ABF04A7-567F-45EB-BBC6-6A8AAB31DFD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"17.1","versionEndExcluding":"17.1-6","matchCriteriaId":"F6DEB940-5662-4074-AC3E-237C357E0418"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"17.2","versionEndExcluding":"17.2-5","matchCriteriaId":"C108E674-7031-46E8-A3E0-9378CEE62A17"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/5ec5e81e409892fe0e41f11d5d36ee6c85a6fbb5","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-7g48-rwqj-ffxw","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=5ec5e81e409892fe0e41f11d5d36ee6c85a6fbb5","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://tuleap.net/plugins/tracker/?aid=46389","source":"security-advisories@github.com","tags":["Issue Tracking"]}]}}]}