{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:43:35.603","vulnerabilities":[{"cve":{"id":"CVE-2026-32714","sourceIdentifier":"security-advisories@github.com","published":"2026-03-31T03:15:55.970","lastModified":"2026-04-03T18:01:22.027","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6."},{"lang":"es","value":"SciTokens es una biblioteca de referencia para generar y usar SciTokens. Antes de la versión 1.9.6, la clase KeyCache en scitokens era vulnerable a la inyección SQL porque utilizaba str.format() de Python para construir consultas SQL con datos proporcionados por el usuario (como issuer y key_id). Esto permitía a un atacante ejecutar comandos SQL arbitrarios contra la base de datos SQLite local. Este problema ha sido parcheado en la versión 1.9.6."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:scitokens:scitokens_library:*:*:*:*:*:*:*:*","versionEndExcluding":"1.9.6","matchCriteriaId":"429A2C44-9B3E-4F01-86BC-818177DD8EF0"}]}]}],"references":[{"url":"https://github.com/scitokens/scitokens/commit/3dba108853f2f4a6c0f2325c03779bf083c41cf2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/scitokens/scitokens/releases/tag/v1.9.6","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}