Skip to main content

CVEs

This page covers the API endpoints for listing, searching, and retrieving detailed intelligence about CVEs tracked by the Live Exploit Tracker.

For an introduction to what the scores and phases mean, see Scores & Ratings and Exploitation Phases. This page focuses on API usage.

List Tracked CVEs

Retrieve a paginated list of all CVEs that CrowdSec is currently tracking.

GET /v1/cves

Parameters

ParameterTypeDefaultDescription
pageinteger1Page number
sizeinteger50Items per page (max 100)
sort_bystringrule_release_dateSort field: rule_release_date, trending, nb_ips, name, first_seen
sort_orderstringdescSort direction: asc, desc
filter_bystringFilter: is_public (only CVEs with public exploits)
# List CVEs sorted by trending (highest CrowdSec Score first)
curl -X 'GET' \
'https://admin.api.crowdsec.net/v1/cves?page=1&size=10&sort_by=trending&sort_order=desc' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}'

Response Fields

Each CVE in the list includes:

FieldTypeDescription
idstringCVE identifier (e.g., CVE-2024-25600)
titlestringHuman-readable title (e.g., "Bricks Builder - RCE")
affected_componentsarrayVendor and product names
crowdsec_scoreintegerComposite severity score (0–10)
opportunity_scoreintegerAttack targeting score (0–5)
momentum_scoreintegerTrend direction score (0–5)
exploitation_phaseobjectCurrent phase: name, label, description
nb_ipsintegerNumber of IPs currently exploiting this CVE
cvss_scorefloatStandard CVSS severity score
has_public_exploitbooleanWhether a public exploit exists
first_seendatetimeWhen CrowdSec first observed exploitation
last_seendatetimeMost recent observed exploitation
published_datedatetimeCVE publication date in NVD
rule_release_datedatetimeWhen CrowdSec released the detection rule
adjustment_scoreobjectScore adjustments: total, recency, low_info
threat_contextobjectContextual threat intelligence: attacker_countries, defender_countries, industry_types, industry_risk_profiles, attacker_objectives. See Threat Context for field details and interpretation. May be null or contain empty sub-objects for low-activity CVEs.

Get CVE Details

Retrieve full intelligence for a specific CVE, including the CrowdSec Analysis narrative, CWE classifications, references, events timeline, and tags.

GET /v1/cves/{cve_id}
curl -X 'GET' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}'

Additional Fields (Detail Only)

In addition to all the list fields, the detail response includes:

FieldTypeDescription
descriptionstringOfficial CVE description
crowdsec_analysisstringHuman-readable intelligence narrative (Markdown)
cwesarrayCWE classifications with name, label, description
referencesarrayExternal reference URLs (advisories, exploits, nuclei templates)
eventsarrayKey events: CVE published, rule released, first seen, CISA KEV, etc.
tagsarrayCategory tags (e.g., wordpress, cms, enterprise_software)

Get CVE Timeline

Retrieve exploitation activity over time for a specific CVE. This powers the activity chart in the web interface.

GET /v1/cves/{cve_id}/timeline

Parameters

ParameterTypeDefaultDescription
intervalstringdayTime bucket size: hour, day, week
curl -X 'GET' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/timeline?interval=week' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}'

The response is an array of timeline items:

FieldTypeDescription
timestampdatetimeStart of the time bucket
countintegerNumber of exploitation events in this bucket

Get IPs Exploiting a CVE

Retrieve the list of IP addresses observed exploiting a specific CVE, enriched with CTI data.

GET /v1/cves/{cve_id}/ips-details

Parameters

ParameterTypeDefaultDescription
pageinteger1Page number
sizeinteger50Items per page
sinceintegerOnly IPs seen in the last N days: 1, 7, or 30
# Get IPs seen exploiting CVE-2024-25600 in the last 7 days
curl -X 'GET' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/ips-details?page=1&size=10&since=7' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}'

IP Response Fields

Each IP item includes CTI data:

FieldTypeDescription
ipstringThe IP address
reputationstringOverall reputation: malicious, suspicious, known, safe
ip_rangestringThe IP's network range (e.g., 70.35.192.0/20)
ip_range_scoreintegerReputation score for the IP range
ip_range_24stringThe /24 subnet (null if not applicable)
ip_range_24_reputationstringReputation of the /24 subnet
ip_range_24_scoreintegerScore for the /24 subnet
as_namestringAutonomous System name (e.g., IONOS SE)
as_numintegerAutonomous System Number
background_noisestringBackground noise level: none, low, medium, high
background_noise_scoreintegerNumeric background noise score
confidencestringConfidence level of the intelligence: low, medium, high
locationobjectcountry, city, latitude, longitude
reverse_dnsstringReverse DNS hostname (null if unavailable)
scoresobjectCTI scores broken down by timeframe (overall, last_day, last_week, last_month), each containing aggressiveness, threat, trust, anomaly, total
classificationsobjectclassifications (actor categories) and false_positives arrays
behaviorsarrayObserved behaviors with name, label, description
attack_detailsarraySpecific attacks observed from this IP with name, label, description
mitre_techniquesarrayMITRE ATT&CK techniques with name, label, description
cvesarrayList of CVE IDs this IP has been observed exploiting
target_countriesobjectCountries targeted by this IP (country code → percentage)
referencesarrayExternal references
historyobjectfirst_seen, last_seen, full_age, days_age

Download IPs (Raw)

Download a raw list of IP addresses exploiting a CVE, suitable for direct import into security tools.

GET /v1/cves/{cve_id}/ips-download

This returns a plain text list of IP addresses, one per line — useful for scripting and bulk import into SIEMs or blocklists.

curl -X 'GET' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/ips-download' \
-H 'x-api-key: ${KEY}'

Manage CVE Integration Subscriptions

You can subscribe and unsubscribe firewall integrations to specific CVEs via the API. See Integrations & Blocklists for full details on creating and managing integrations.

For broader coverage, consider subscribing to a vendor instead of individual CVEs. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See Vendor Subscriptions.

Subscribe an Integration to a CVE

POST /v1/cves/{cve_id}/integrations
curl -X 'POST' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/integrations' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}' \
-H 'Content-Type: application/json' \
-d '{"name": "my_firewall_integration"}'

List Subscribed Integrations for a CVE

GET /v1/cves/{cve_id}/integrations

Unsubscribe an Integration from a CVE

DELETE /v1/cves/{cve_id}/integrations/{integration_name}
curl -X 'DELETE' \
'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/integrations/my_firewall_integration' \
-H 'accept: application/json' \
-H 'x-api-key: ${KEY}'