{"api_version":"1","generated_at":"2026-04-15T05:22:44+00:00","cve":"CVE-2023-35937","urls":{"html":"https://cve.report/CVE-2023-35937","api":"https://cve.report/api/cve/CVE-2023-35937.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-35937","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-35937"},"summary":{"title":"CVE-2023-35937","description":"Metersphere is an open source continuous testing platform. In versions prior to 2.10.2 LTS, some key APIs in Metersphere lack permission checks. This allows ordinary users to execute APIs that can only be executed by space administrators or project administrators. For example, ordinary users can be updated as space administrators. Version 2.10.2 LTS has a patch for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-07-06 14:15:00","updated_at":"2023-07-12 18:34:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r","refsource":"MISC","tags":[],"title":"metersphere 存在权限检查缺失漏洞 · Advisory · metersphere/metersphere · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-35937","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35937","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"35937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metersphere","cpe5":"metersphere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-35937","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Metersphere is an open source continuous testing platform. In versions prior to 2.10.2 LTS, some key APIs in Metersphere lack permission checks. This allows ordinary users to execute APIs that can only be executed by space administrators or project administrators. For example, ordinary users can be updated as space administrators. Version 2.10.2 LTS has a patch for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862: Missing Authorization","cweId":"CWE-862"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"metersphere","product":{"product_data":[{"product_name":"metersphere","version":{"version_data":[{"version_affected":"=","version_value":"< 2.10.2-LTS"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r","refsource":"MISC","name":"https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r"}]},"source":{"advisory":"GHSA-7xj3-qrx5-524r","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-06 14:15:00","lastModifiedDate":"2023-07-12 18:34:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*","versionEndExcluding":"2.10.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}