{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T08:46:05.413","vulnerabilities":[{"cve":{"id":"CVE-2026-27645","sourceIdentifier":"security-advisories@github.com","published":"2026-02-25T05:17:26.317","lastModified":"2026-02-25T16:51:33.417","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.1, the RSS single-watch endpoint reflects the UUID path parameter directly in the HTTP response body without HTML escaping. Since Flask returns text/html by default for plain string responses, the browser parses and executes injected JavaScript. Version 0.54.1 contains a fix for the issue."},{"lang":"es","value":"changedetection.io es una herramienta gratuita de código abierto para la detección de cambios en páginas web. En versiones anteriores a la 0.54.1, el endpoint RSS de monitoreo único refleja el parámetro de ruta UUID directamente en el cuerpo de la respuesta HTTP sin escape HTML. Dado que Flask devuelve text/html por defecto para respuestas de cadena de texto plano, el navegador analiza y ejecuta JavaScript inyectado. La versión 0.54.1 contiene una corrección para el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:*","versionEndExcluding":"0.54.1","matchCriteriaId":"582BB3C2-9FD0-4217-A5DF-67ACC72BA029"}]}]}],"references":[{"url":"https://github.com/dgtlmoon/changedetection.io/commit/a385c89abf44b52fcfa20c7c6a6dd3047c4c1eb5","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-mw8m-398g-h89w","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-mw8m-398g-h89w","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}