Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-wsjn-nkrs-vkgw |
| Summary | Due to insufficient escaping of special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4089 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20641 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20911 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20926 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20882 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20831 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20822 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20814 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20797 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20678 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20674 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20999 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21056 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20849 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4089 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
138 |
| name |
Improper Neutralization of Special Elements |
| description |
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as control elements or syntactic markers when they are sent to a downstream component. |
|
|
| Exploits |
|
| Severity_range_score | 5.1 - 8.9 |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-wsjn-nkrs-vkgw |