{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:08:28.000","vulnerabilities":[{"cve":{"id":"CVE-2026-30829","sourceIdentifier":"security-advisories@github.com","published":"2026-03-07T06:16:10.957","lastModified":"2026-03-11T18:56:04.560","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. Prior to version 3.4.0, an unauthenticated information disclosure vulnerability exists in the GET /api/v1/status-page/:url endpoint. The endpoint does not enforce authentication or verify whether a status page is published before returning full status page details. As a result, unpublished status pages and their associated internal data are accessible to any unauthenticated user via direct API requests. This issue has been patched in version 3.4.0."},{"lang":"es","value":"Checkmate es una herramienta de código abierto y autoalojada diseñada para rastrear y monitorear el hardware del servidor, el tiempo de actividad, los tiempos de respuesta y los incidentes en tiempo real con hermosas visualizaciones. Antes de la versión 3.4.0, existe una vulnerabilidad de revelación de información no autenticada en el endpoint GET /api/v1/status-page/:url. El endpoint no aplica autenticación ni verifica si una página de estado está publicada antes de devolver los detalles completos de la página de estado. Como resultado, las páginas de estado no publicadas y sus datos internos asociados son accesibles para cualquier usuario no autenticado a través de solicitudes directas a la API. Este problema ha sido parcheado en la versión 3.4.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bluewavelabs:checkmate:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.0","matchCriteriaId":"47231DDC-8E2F-4BBA-95DA-C270F8DE9F14"}]}]}],"references":[{"url":"https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-57xf-wg6w-fjrr","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}