{"id":"CVE-2021-37694","details":"@asyncapi/java-spring-cloud-stream-template generates a Spring Cloud Stream (SCSt) microservice. In versions prior to 0.7.0 arbitrary code injection was possible when an attacker controls the AsyncAPI document. An example is provided in GHSA-xj6r-2jpm-qvxp. There are no mitigations available and all users are advised to update.","aliases":["GHSA-xj6r-2jpm-qvxp"],"modified":"2026-04-12T01:57:10.094548Z","published":"2021-08-11T18:15:07.403Z","related":["GHSA-xj6r-2jpm-qvxp"],"references":[{"type":"EVIDENCE","url":"https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/asyncapi/java-spring-cloud-stream-template","events":[{"introduced":"0"},{"fixed":"5b1858ebe985cd90de6327d28570b8bc49af202c"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"0.7.0"}],"cpe":"cpe:2.3:a:asyncapi:java-spring-cloud-stream-template:*:*:*:*:*:node.js:*:*"}}],"versions":["v0.1.0","v0.2.0","v0.3.0","v0.3.1","v0.3.2","v0.4.0","v0.4.1","v0.5.0","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.6.8","v0.6.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-37694.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}