{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-27787","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2026-04-03T04:29:15.069Z","datePublished":"2026-04-08T05:11:11.154Z","dateUpdated":"2026-04-08T13:55:07.158Z"},"containers":{"cna":{"affected":[{"vendor":"ICZ Corporation","product":"MATCHA SNS","versions":[{"version":"1.3.9 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Cross-site scripting vulnerability exists in MATCHA SNS 1.3.9 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product."}],"problemTypes":[{"descriptions":[{"description":"Cross-site scripting (XSS)","lang":"en-US","cweId":"CWE-79","type":"CWE"}]}],"references":[{"url":"https://oss.icz.co.jp/news/?p=1388"},{"url":"https://jvn.jp/en/jp/JVN33581068/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"MEDIUM","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}},{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","baseSeverity":"MEDIUM","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2026-04-08T05:11:11.154Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-08T13:55:00.130119Z","id":"CVE-2026-27787","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-08T13:55:07.158Z"}}]}}