{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T06:21:19.750","vulnerabilities":[{"cve":{"id":"CVE-2026-25480","sourceIdentifier":"security-advisories@github.com","published":"2026-02-09T20:15:57.330","lastModified":"2026-02-17T15:12:34.963","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, FileStore maps cache keys to filenames using Unicode NFKD normalization and ord() substitution without separators, creating key collisions. When FileStore is used as response-cache backend, an unauthenticated remote attacker can trigger cache key collisions via crafted paths, causing one URL to serve cached responses of another (cache poisoning/mixup). This vulnerability is fixed in 2.20.0."},{"lang":"es","value":"Litestar es un framework de Interfaz de Pasarela de Servidor Asíncrono (ASGI). Antes de la versión 2.20.0, FileStore mapea las claves de caché a nombres de archivo utilizando la normalización Unicode NFKD y la sustitución ord() sin separadores, creando colisiones de claves. Cuando FileStore se utiliza como backend de caché de respuestas, un atacante remoto no autenticado puede desencadenar colisiones de claves de caché a través de rutas manipuladas, haciendo que una URL sirva respuestas en caché de otra (envenenamiento/mezcla de caché). Esta vulnerabilidad está corregida en la versión 2.20.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-176"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:litestar:litestar:*:*:*:*:*:*:*:*","versionEndExcluding":"2.20.0","matchCriteriaId":"67E26161-0CDE-4B8F-A065-04A19BC4CDCB"}]}]}],"references":[{"url":"https://docs.litestar.dev/2/release-notes/changelog.html#2.20.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/litestar-org/litestar/commit/85db6183a76f8a6b3fd6ee3c88d860b9f37a2cca","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/litestar-org/litestar/releases/tag/v2.20.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/litestar-org/litestar/security/advisories/GHSA-vxqx-rh46-q2pg","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}