{"id":"CVE-2020-7675","details":"cd-messenger through 2.7.26 is vulnerable to Arbitrary Code Execution. User input provided to the `color` argument executed by the `eval` function resulting in code execution.","aliases":["GHSA-v756-4whv-48vc"],"modified":"2026-03-13T21:59:27.418736Z","published":"2020-06-10T16:15:10.790Z","related":["SNYK-JS-CDMESSENGER-571493"],"references":[{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mikeerickson/cd-messenger","events":[{"introduced":"0"},{"last_affected":"27679da76aed6e6f45ff4149067d357ca77df614"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.26"}]}}],"versions":["v2.0.0","v2.0.0-build.161","v2.0.0-build.163","v2.0.0-build.180","v2.0.0-build.181","v2.0.0-build.187","v2.0.0-build.203","v2.0.0-build.204","v2.0.0-build.207","v2.0.0-build.210","v2.0.0-build.211","v2.0.0-build.212","v2.0.0-build.213","v2.0.0-build.214","v2.0.0-build.215","v2.0.0-build.216","v2.0.0-build.217","v2.0.0-build.219","v2.0.1","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.1.0","v2.1.1","v2.2.0","v2.2.1","v2.2.1-build.24","v2.2.1-build.7","v2.2.2","v2.2.3","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.4.1","v2.5.0","v2.5.1","v2.5.2","v2.6.0","v2.6.1","v2.7.0","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.16","v2.7.17","v2.7.19","v2.7.2","v2.7.20","v2.7.21","v2.7.22","v2.7.23","v2.7.24","v2.7.26","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7675.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}