{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25204","assignerOrgId":"ca193ba2-0cff-4e34-b04e-1ea07103c6fe","state":"PUBLISHED","assignerShortName":"samsung.tv_appliance","dateReserved":"2026-01-30T06:07:11.090Z","datePublished":"2026-04-13T00:47:31.806Z","dateUpdated":"2026-04-14T07:45:27.372Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ca193ba2-0cff-4e34-b04e-1ea07103c6fe","shortName":"samsung.tv_appliance","dateUpdated":"2026-04-14T07:45:27.372Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-502","description":"CWE-502 Deserialization of untrusted data","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-843","description":"CWE-843 Access of resource using incompatible type ('type confusion')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-586","descriptions":[{"lang":"en","value":"CAPEC-586 Object Injection"}]}],"affected":[{"vendor":"Samsung Open Source","product":"Escargot","versions":[{"status":"affected","version":"97e8115ab1110bc502b4b5e4a0c689a71520d335"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort.\n\nThis issue affects escarogt prior to commit hash \n\n97e8115ab1110bc502b4b5e4a0c689a71520d335","supportingMedia":[{"type":"text/html","base64":false,"value":"<div>Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort.</div><div>This issue affects escarogt prior to&nbsp;commit hash \n\n<span>97e8115ab1110bc502b4b5e4a0c689a71520d335</span>\n\n</div>"}]}],"references":[{"url":"https://github.com/Samsung/escargot/pull/1554"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":6.2,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}}],"credits":[{"lang":"en","value":"LeeJaeWook","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-25204","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-04-13T17:36:54.369644Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-13T18:06:17.946Z"}}]}}