{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T20:54:33.622","vulnerabilities":[{"cve":{"id":"CVE-2026-31833","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T22:16:21.410","lastModified":"2026-03-18T20:01:24.743","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Umbraco is an ASP.NET CMS. From 16.2.0 to before 16.5.1 and 17.2.2, An authenticated backoffice user with access to Settings can inject malicious HTML into property type descriptions. Due to an overly permissive attributeNameCheck configuration (/.+/) in the UFM DOMPurify instance, event handler attributes such as onclick and onload, when used within Umbraco web components (umb-*, uui-*, ufm-*) were not filtered. This vulnerability is fixed in 16.5.1 and 17.2.2."},{"lang":"es","value":"Umbraco es un CMS de ASP.NET. Desde la versión 16.2.0 hasta antes de la 16.5.1 y la 17.2.2, un usuario autenticado del backoffice con acceso a Settings puede inyectar HTML malicioso en las descripciones de tipos de propiedades. Debido a una configuración de attributeNameCheck (/.+/) excesivamente permisiva en la instancia de DOMPurify de UFM, los atributos de gestor de eventos como onclick y onload, cuando se usaban dentro de componentes web de Umbraco (umb-*, uui-*, ufm-*), no se filtraban. Esta vulnerabilidad está corregida en las versiones 16.5.1 y 17.2.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":5.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"16.2.0","versionEndExcluding":"16.5.1","matchCriteriaId":"2BB33F17-782C-4F7C-AC48-CC05C1B1886D"},{"vulnerable":true,"criteria":"cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.2.2","matchCriteriaId":"7C8D4B05-B561-4CDB-8B2A-BD734F9E9A74"}]}]}],"references":[{"url":"https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-vrqc-59mw-qqg7","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}