{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T00:34:06.653","vulnerabilities":[{"cve":{"id":"CVE-2026-30878","sourceIdentifier":"security-advisories@github.com","published":"2026-03-31T01:16:35.977","lastModified":"2026-04-01T20:28:15.140","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3."},{"lang":"es","value":"baserCMS es un framework de desarrollo de sitios web. Anteriormente a la versión 5.2.3, una API pública de envío de correo permite a usuarios no autenticados enviar entradas de formularios de correo incluso cuando el formulario correspondiente no está aceptando envíos. Esto elude los controles administrativos destinados a detener la recepción de formularios y permite el correo no deseado o el abuso a través de la API. Este problema ha sido parcheado en la versión 5.2.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.2.3","matchCriteriaId":"07DEEEF3-0621-431D-8A38-405EDBD0957E"}]}]}],"references":[{"url":"https://basercms.net/security/JVN_20837860","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}