{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22237","assignerOrgId":"56a186b1-7f5e-4314-ba38-38d5499fccfd","state":"PUBLISHED","assignerShortName":"MHV","dateReserved":"2026-01-06T23:20:59.365Z","datePublished":"2026-01-14T14:36:47.670Z","dateUpdated":"2026-01-14T15:00:36.337Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"BLUVOYIX","vendor":"Bluspark Global","versions":[{"status":"affected","version":"0"}]}],"credits":[{"lang":"en","type":"finder","value":"This vulnerability was discovered by Eaton Zveare."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vulnerability exists in BLUVOYIX due to the exposure of sensitive internal API documentation. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the APIs exposed by the documentation. Successful exploitation of this vulnerability could allow the attacker to cause damage to the targeted platform by abusing internal functionality.<br>"}],"value":"The vulnerability exists in BLUVOYIX due to the exposure of sensitive internal API documentation. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the APIs exposed by the documentation. Successful exploitation of this vulnerability could allow the attacker to cause damage to the targeted platform by abusing internal functionality."}],"impacts":[{"capecId":"CAPEC-169","descriptions":[{"lang":"en","value":"CAPEC-169 Footprinting"}]},{"capecId":"CAPEC-36","descriptions":[{"lang":"en","value":"CAPEC-36 Using Unpublished Interfaces or Functionality"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":10,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/RE:L/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"56a186b1-7f5e-4314-ba38-38d5499fccfd","shortName":"MHV","dateUpdated":"2026-01-14T14:36:47.670Z"},"references":[{"url":"https://blusparkglobal.com/bluvoyix/"}],"source":{"discovery":"UNKNOWN"},"title":"Exposed Internal API Documentation Vulnerability in BLUVOYIX","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-14T15:00:27.144659Z","id":"CVE-2026-22237","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T15:00:36.337Z"}}]}}