{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T13:48:04.882","vulnerabilities":[{"cve":{"id":"CVE-2026-25160","sourceIdentifier":"security-advisories@github.com","published":"2026-02-04T20:16:06.720","lastModified":"2026-02-13T21:23:28.700","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. This issue has been patched in version 3.57.0."},{"lang":"es","value":"Alist es un programa de listado de archivos que soporta múltiples almacenamientos, impulsado por Gin y Solidjs. Antes de la versión 3.57.0, la aplicación deshabilita la verificación de certificados TLS por defecto para todas las comunicaciones salientes del controlador de almacenamiento, haciendo el sistema vulnerable a ataques man-in-the-middle (MitM). Esto permite el descifrado completo, el robo y la manipulación de todos los datos transmitidos durante las operaciones de almacenamiento, comprometiendo gravemente la confidencialidad e integridad de los datos del usuario. Este problema ha sido parcheado en la versión 3.57.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alistgo:alist:*:*:*:*:*:*:*:*","versionEndExcluding":"3.57.0","matchCriteriaId":"6604E5A5-7438-488A-97E5-7632264956BF"}]}]}],"references":[{"url":"https://github.com/AlistGo/alist/commit/69629ca76a8f2c8c973ede3b616f93aa26ff23fb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/AlistGo/alist/security/advisories/GHSA-8jmm-3xwx-w974","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}