[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2025-71211":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-21T14:01:49.036Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":47,"state":48,"summary":49,"references_raw":56,"kevs":66,"epss":9,"epss_history":67,"metrics":68,"affected":75},"CVE-2025-71211","A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different executable. \r\n\r\nPlease note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been mitigated and no customer action required.\r\n\r\nFor this particular vulnerability, an attacker must have access to the Trend Micro Apex One Management Console, so customers that have their console�s IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-22","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-126","Path Traversal",[],{"id":25,"name":26,"techniques":27},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":29,"name":30,"techniques":31},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":33,"name":34,"techniques":35},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":37,"name":38,"techniques":39},"CAPEC-79","Using Slashes in Alternate Encoding",[],[],[],[],[],[],[],"2026-05-21T13:02:02.834Z","2026-05-21T14:09:53.718Z","Undergoing Analysis",{"cisa_kev":50,"cisa_ransomware":50,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":51,"severity_score":52,"severity_version":53,"severity_source":54,"severity_vector":55,"severity_status":48},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[57,62],{"url":58,"sources":59,"tags":61},"https://success.trendmicro.com/en-US/solution/KA-0022458",[54,60],"nvd",[],{"url":63,"sources":64,"tags":65},"https://www.zerodayinitiative.com/advisories/ZDI-26-137/",[54,60],[],[],[],[69,73],{"source":54,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":70,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":71,"vectorString":55,"impactScore":52,"exploitabilityScore":72},"CRITICAL",10,{"source":60,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":74,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":71,"vectorString":55,"impactScore":52,"exploitabilityScore":72},[76,89],{"ecosystem":9,"name":77,"vendor":78,"product":79,"cpe_part":80,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":81},"TrendAI Apex One","trend micro, inc.","trendai apex one","a",[82],{"version":83,"is_range":84,"range_type":54,"version_start":85,"version_start_type":86,"version_end":87,"version_end_type":88,"fixed_in":9},">= 2019 (14.0), \u003C 14.0.0.14136",true,"2019 (14.0)","including","14.0.0.14136","excluding",{"ecosystem":9,"name":90,"vendor":78,"product":91,"cpe_part":80,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":92},"TrendAI Apex One as a Service","trendai apex one as a service",[93],{"version":94,"is_range":84,"range_type":54,"version_start":95,"version_start_type":86,"version_end":96,"version_end_type":88,"fixed_in":9},">= SaaS, \u003C 14.0.20315","SaaS","14.0.20315"]