{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T23:53:39.036","vulnerabilities":[{"cve":{"id":"CVE-2026-2818","sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","published":"2026-02-20T17:25:57.980","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only."},{"lang":"es","value":"Una vulnerabilidad de salto de ruta zip-slip en la funcionalidad de importación de instantáneas de Spring Data Geode permite a los atacantes escribir archivos fuera del directorio de extracción previsto. Esta vulnerabilidad parece ser susceptible solo en sistemas operativos Windows."}],"metrics":{"cvssMetricV31":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.7}]},"weaknesses":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]}],"references":[{"url":"https://www.herodevs.com/vulnerability-directory/cve-2026-2818","source":"36c7be3b-2937-45df-85ea-ca7133ea542c"}]}}]}