{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T02:33:08.520","vulnerabilities":[{"cve":{"id":"CVE-2026-27730","sourceIdentifier":"security-advisories@github.com","published":"2026-02-25T16:23:27.123","lastModified":"2026-02-27T17:43:47.737","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"esm.sh is a no-build content delivery network (CDN) for web development. Versions up to and including 137 have an SSRF vulnerability (CWE-918) in esm.sh’s `/http(s)` fetch route. The service tries to block localhost/internal targets, but the validation is based on hostname string checks and can be bypassed using DNS alias domains. This allows an external requester to make the esm.sh server fetch internal localhost services. As of time of publication, no known patched versions exist."},{"lang":"es","value":"esm.sh es una red de entrega de contenido (CDN) sin compilación para desarrollo web. Las versiones hasta la 137 inclusive tienen una vulnerabilidad SSRF (CWE-918) en la ruta de obtención '/http(s)' de esm.sh. El servicio intenta bloquear objetivos localhost/internos, pero la validación se basa en comprobaciones de cadenas de nombres de host y puede ser eludida usando dominios alias de DNS. Esto permite que un solicitante externo haga que el servidor de esm.sh obtenga servicios internos de localhost. Hasta el momento de la publicación, no existen versiones parcheadas conocidas."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:esm:esm.sh:*:*:*:*:*:*:*:*","versionEndIncluding":"137","matchCriteriaId":"AD6FA8D1-421D-416D-98EE-9DD8B7C02AAB"}]}]}],"references":[{"url":"https://github.com/esm-dev/esm.sh/security/advisories/GHSA-p2v6-84h2-5x4r","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}