{"api_version":"1","generated_at":"2026-04-15T07:44:37+00:00","cve":"CVE-2023-40580","urls":{"html":"https://cve.report/CVE-2023-40580","api":"https://cve.report/api/cve/CVE-2023-40580.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-40580","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-40580"},"summary":{"title":"CVE-2023-40580","description":"Freighter is a Stellar chrome extension. It may be possible for a malicious website to access the recovery mnemonic phrase when the Freighter wallet is unlocked. This vulnerability impacts access control to the mnemonic recovery phrase. This issue was patched in version 5.3.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-25 20:15:00","updated_at":"2023-08-31 17:38:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w","name":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w","refsource":"MISC","tags":[],"title":"Mnemonic phrase may be accessed by Javascript through a private API · Advisory · stellar/freighter · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/stellar/freighter/pull/948","name":"https://github.com/stellar/freighter/pull/948","refsource":"MISC","tags":[],"title":"Prevent Javascript from accessing the mnemonic phrase through a private API by piyalbasu · Pull Request #948 · stellar/freighter · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee","name":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee","refsource":"MISC","tags":[],"title":"Prevent Javascript from accessing the mnemonic phrase through a priva… · stellar/freighter@81f78ba · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-40580","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40580","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"40580","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"stellar","cpe5":"freighter","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-40580","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Freighter is a Stellar chrome extension. It may be possible for a malicious website to access the recovery mnemonic phrase when the Freighter wallet is unlocked. This vulnerability impacts access control to the mnemonic recovery phrase. This issue was patched in version 5.3.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"stellar","product":{"product_data":[{"product_name":"freighter","version":{"version_data":[{"version_affected":"=","version_value":"< 5.3.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w","refsource":"MISC","name":"https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w"},{"url":"https://github.com/stellar/freighter/pull/948","refsource":"MISC","name":"https://github.com/stellar/freighter/pull/948"},{"url":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee","refsource":"MISC","name":"https://github.com/stellar/freighter/commit/81f78ba008c41ce631a3d0f9e4449f4bbd90baee"}]},"source":{"advisory":"GHSA-vqr6-hwg2-775w","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-25 20:15:00","lastModifiedDate":"2023-08-31 17:38:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:stellar:freighter:*:*:*:*:*:*:*:*","versionEndExcluding":"5.3.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}