{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T16:33:03.777","vulnerabilities":[{"cve":{"id":"CVE-2026-28800","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T07:16:00.700","lastModified":"2026-03-10T19:42:54.133","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, anyone with Discord Remote Control set up in a non-private channel gives access to any user with the permission to send message in said channel access to do anything on their computer. This includes keyboard and mouse inputs and full file access. This issue has been patched in version 1.1.0."},{"lang":"es","value":"Natro Macro es un macro de código abierto para Bee Swarm Simulator escrito en AutoHotkey. Antes de la versión 1.1.0, cualquier persona que tuviera Discord Remote Control configurado en un canal no privado otorgaba acceso a cualquier usuario con permiso para enviar mensajes en dicho canal para hacer cualquier cosa en su ordenador. Esto incluye entradas de teclado y ratón y acceso completo a los archivos. Este problema ha sido parcheado en la versión 1.1.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"},{"lang":"en","value":"CWE-287"},{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:natroteam:natro_macro:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0","matchCriteriaId":"D82B08C5-1B84-4F2F-82F7-32C5DF3DC40D"}]}]}],"references":[{"url":"https://github.com/NatroTeam/NatroMacro/security/advisories/GHSA-ph9r-2qjm-ghvg","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}