{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-31120","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-03-26T15:04:52.625Z","datePublished":"2025-04-18T15:52:57.791Z","dateUpdated":"2025-04-18T20:01:03.192Z"},"containers":{"cna":{"title":"NamelessMC Vulnerable to Cookie-Based View Count Manipulation","problemTypes":[{"descriptions":[{"cweId":"CWE-565","lang":"en","description":"CWE-565: Reliance on Cookies without Validation and Integrity Checking","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-8jv7-77jw-h646","tags":["x_refsource_CONFIRM"],"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-8jv7-77jw-h646"},{"name":"https://github.com/NamelessMC/Nameless/commit/9b112c0beab346a38b6f5a51e7773b38c6fc52e7","tags":["x_refsource_MISC"],"url":"https://github.com/NamelessMC/Nameless/commit/9b112c0beab346a38b6f5a51e7773b38c6fc52e7"},{"name":"https://github.com/NamelessMC/Nameless/releases/tag/v2.2.0","tags":["x_refsource_MISC"],"url":"https://github.com/NamelessMC/Nameless/releases/tag/v2.2.0"}],"affected":[{"vendor":"NamelessMC","product":"Nameless","versions":[{"version":"< 2.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-04-18T15:52:57.791Z"},"descriptions":[{"lang":"en","value":"NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In version 2.1.4 and prior, an insecure view count mechanism in the forum page allows an unauthenticated attacker to artificially increase the view count. The application relies on a client-side cookie (nl-topic-[tid]) (or session variable for guests) to determine if a view should be counted. When a client does not provide the cookie, every page request increments the counter, leading to incorrect view metrics. This issue has been patched in version 2.2.0."}],"source":{"advisory":"GHSA-8jv7-77jw-h646","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-8jv7-77jw-h646","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-18T20:00:43.144400Z","id":"CVE-2025-31120","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-18T20:01:03.192Z"}}]}}