{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T18:27:54.741","vulnerabilities":[{"cve":{"id":"CVE-2026-30223","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T21:16:16.113","lastModified":"2026-03-12T16:05:52.767","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either \"authJwtPubKeyPath\" (local RSA public key) or \"authJwtHmacSecret\" (HMAC secret), the configured audience value (authJwtAud) is not enforced during token parsing. As a result, validly signed JWT tokens with an incorrect aud claim are accepted for authentication. This allows authentication using tokens intended for a different audience/service. This issue has been patched in version 3000.11.1."},{"lang":"es","value":"OliveTin da acceso a comandos shell predefinidos desde una interfaz web. Antes de la versión 3000.11.1, cuando la autenticación JWT está configurada usando 'authJwtPubKeyPath' (clave pública RSA local) o 'authJwtHmacSecret' (secreto HMAC), el valor de audiencia configurado (authJwtAud) no se aplica durante el análisis del token. Como resultado, los tokens JWT firmados válidamente con una declaración 'aud' incorrecta son aceptados para la autenticación. Esto permite la autenticación usando tokens destinados a una audiencia/servicio diferente. Este problema ha sido parcheado en la versión 3000.11.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-287"},{"lang":"en","value":"CWE-345"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:*","versionEndExcluding":"3000.11.1","matchCriteriaId":"36F31F34-F899-413C-9A07-C14E32C66807"}]}]}],"references":[{"url":"https://github.com/OliveTin/OliveTin/commit/e97d8ecbd8d6ba468c418ca496fcd18f78131233","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OliveTin/OliveTin/releases/tag/3000.11.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/OliveTin/OliveTin/security/advisories/GHSA-g962-2j28-3cg9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}