Skip to content

Commit 0ce9098

Browse files
Sync EUVD catalog: Wed Apr 1 00:39:43 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 8adb13f commit 0ce9098

169 files changed

Lines changed: 6093 additions & 64 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/2026/03/EUVD-2025-209130.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"id": "EUVD-2025-209130",
33
"enisaUuid": "3b4f22a0-365e-3871-ae27-5ae8406bb62b",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:43:48 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:43:48 AM",
4+
"description": "baserCMS has Unsafe File Upload Leading to Remote Code Execution (RCE)",
5+
"datePublished": "Mar 31, 2026, 10:22:18 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:22:18 PM",
77
"baseScore": 8.7,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-hv78-cwp4-8r7r\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
11-
"aliases": "CVE-2025-32957\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-hv78-cwp4-8r7r\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-32957\n",
11+
"aliases": "GHSA-hv78-cwp4-8r7r\nCVE-2025-32957\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,
1414
"enisaIdProduct": [
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"id": "EUVD-2025-209147",
3+
"enisaUuid": "e2fb3e47-fef0-3ad4-916d-6c7ad9d12d69",
4+
"description": "Pega Platform versions 8.1.0 through 25.1.0 are affected by a Stored Cross-site Scripting vulnerability in a user interface component. Requires an administrative user and given extensive access rights, impact to Confidentiality is low and Integrity is none.",
5+
"datePublished": "Mar 31, 2026, 5:52:07 PM",
6+
"dateUpdated": "Mar 31, 2026, 6:33:01 PM",
7+
"baseScore": 4.8,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://support.pega.com/support-doc/pega-security-advisory-o25-vulnerability-remediation-note\n",
11+
"aliases": "CVE-2025-62184\n",
12+
"assigner": "Pega",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "f9ef78fa-7818-3bad-ac3f-c6a88d15b575",
17+
"product": {
18+
"name": "Pega Infinity"
19+
},
20+
"product_version": "8.1.0 <Infinity 25.1.0"
21+
}
22+
],
23+
"enisaIdVendor": [
24+
{
25+
"id": "55c122e1-0130-374c-92d6-aa074773c4e5",
26+
"vendor": {
27+
"name": "Pegasystems"
28+
}
29+
}
30+
]
31+
}

advisories/2026/03/EUVD-2026-17255.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"id": "EUVD-2026-17255",
33
"enisaUuid": "fece7039-df6b-3da3-95b2-78892f5a7c41",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:43:58 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:43:58 AM",
4+
"description": "baserCMS has OS Command Injection Leading to Remote Code Execution (RCE)",
5+
"datePublished": "Mar 31, 2026, 10:27:05 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:27:05 PM",
77
"baseScore": 9.1,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-21861\n",
1111
"aliases": "CVE-2026-21861\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,

advisories/2026/03/EUVD-2026-17257.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"id": "EUVD-2026-17257",
33
"enisaUuid": "dd4823cb-00e0-31ac-8dcc-8e232cc9899e",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has a SQL injection vulnerability in blog posts. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:44:20 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:44:20 AM",
4+
"description": "baserCMS has an SQL injection vulnerability in its blog post functionality",
5+
"datePublished": "Mar 31, 2026, 10:35:08 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:35:08 PM",
77
"baseScore": 6.9,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-vh89-rjph-2g7p\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-vh89-rjph-2g7p\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-27697\n",
1111
"aliases": "CVE-2026-27697\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,

advisories/2026/03/EUVD-2026-17259.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"id": "EUVD-2026-17259",
33
"enisaUuid": "1ab37ae7-5325-38b4-8df1-250f04c94766",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitrary OS commands on the server with the privileges of the user account running baserCMS. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:45:09 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:45:09 AM",
4+
"description": "baserCMS Update Functionality Vulnerable to OS Command Injection",
5+
"datePublished": "Mar 31, 2026, 10:35:47 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:35:47 PM",
77
"baseScore": 9.1,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-m9g7-rgfc-jcm7\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-m9g7-rgfc-jcm7\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-30877\n",
1111
"aliases": "CVE-2026-30877\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,

advisories/2026/03/EUVD-2026-17261.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"id": "EUVD-2026-17261",
33
"enisaUuid": "6bdf85d2-beef-3bc9-a4b2-2c716b54bb58",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:45:21 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:45:21 AM",
4+
"description": "baserCMS has Mail Form Acceptance Bypass via Public API",
5+
"datePublished": "Mar 31, 2026, 10:36:18 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:36:18 PM",
77
"baseScore": 5.3,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-30878\n",
1111
"aliases": "CVE-2026-30878\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,

advisories/2026/03/EUVD-2026-17263.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"id": "EUVD-2026-17263",
33
"enisaUuid": "7d3c1546-aedf-3e3d-9231-56f859cc81b1",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has a cross-site scripting vulnerability in blog posts. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:45:50 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:45:50 AM",
4+
"description": "baserCMS has a cross-site scripting vulnerability in blog posts",
5+
"datePublished": "Mar 31, 2026, 10:43:10 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:43:10 PM",
77
"baseScore": 6.9,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-jmq3-x8q7-j9qm\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
11-
"aliases": "CVE-2026-30879\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-jmq3-x8q7-j9qm\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-30879\n",
11+
"aliases": "CVE-2026-30879\nGHSA-jmq3-x8q7-j9qm\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,
1414
"enisaIdProduct": [

advisories/2026/03/EUVD-2026-17265.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"id": "EUVD-2026-17265",
33
"enisaUuid": "20a6b96d-54b8-3a21-bca5-107486d4b516",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has an OS command injection vulnerability in the installer. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:44:39 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:44:39 AM",
4+
"description": "baserCMS has OS command injection vulnerability in installer",
5+
"datePublished": "Mar 31, 2026, 10:43:31 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:43:31 PM",
77
"baseScore": 9.2,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-6hpg-8rx3-cwgv\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
11-
"aliases": "CVE-2026-30880\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-6hpg-8rx3-cwgv\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-30880\n",
11+
"aliases": "GHSA-6hpg-8rx3-cwgv\nCVE-2026-30880\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,
1414
"enisaIdProduct": [

advisories/2026/03/EUVD-2026-17267.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"id": "EUVD-2026-17267",
33
"enisaUuid": "6ffa701f-4ec8-337b-92f7-1303f5c473ad",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, a path traversal vulnerability exists in the theme file management API (/baser/api/admin/bc-theme-file/theme_files/add.json) that allows arbitrary file write. An authenticated administrator can include ../ sequences in the path parameter to create a PHP file in an arbitrary directory outside the theme directory, which may result in remote code execution (RCE). This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:45:35 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:45:35 AM",
4+
"description": "baserCMS Path Traversal Leads to Arbitrary File Write and RCE via Theme File API",
5+
"datePublished": "Mar 31, 2026, 10:47:39 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:47:39 PM",
77
"baseScore": 7.2,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-c5c6-37vq-pjcq\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
11-
"aliases": "CVE-2026-30940\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-c5c6-37vq-pjcq\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-30940\n",
11+
"aliases": "CVE-2026-30940\nGHSA-c5c6-37vq-pjcq\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,
1414
"enisaIdProduct": [

advisories/2026/03/EUVD-2026-17269.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"id": "EUVD-2026-17269",
33
"enisaUuid": "4d2c5da4-d73a-3be8-a684-534e7cf763e4",
4-
"description": "baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has DOM-based cross-site scripting in tag creation. This issue has been patched in version 5.2.3.",
5-
"datePublished": "Mar 31, 2026, 12:46:43 AM",
6-
"dateUpdated": "Mar 31, 2026, 12:46:43 AM",
4+
"description": "baserCMS is Vulnerable to Cross-site Scripting",
5+
"datePublished": "Mar 31, 2026, 10:52:07 PM",
6+
"dateUpdated": "Mar 31, 2026, 10:52:07 PM",
77
"baseScore": 7.1,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
10-
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-677c-xv24-crgx\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\n",
10+
"references": "https://github.com/baserproject/basercms/security/advisories/GHSA-677c-xv24-crgx\nhttps://basercms.net/security/JVN_20837860\nhttps://github.com/baserproject/basercms/releases/tag/5.2.3\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-32734\n",
1111
"aliases": "CVE-2026-32734\n",
1212
"assigner": "GitHub_M",
1313
"epss": 0.0,

0 commit comments

Comments
 (0)