Is it possible to fetch CVEs based on a software name and/or it’s associated version via an API call to Vulmatch? If yes, what is the endpoint of the API call and preferably the link to it’s documentation would be helpful.
Yes. Let me break it down
software name and/or it’s associated version
In Vulmatch we use CPEs to represent software.
If you view the API docs, you will see the ability to search for CPEs in various ways.
The CPE object search is where you want to start. It accepts a lot of optional filters to find the softwares you want
curl -X 'GET' \
'https://api.vulmatch.com/v1/cpe/objects/?product=chrome&vendor=google' \
-H 'accept: application/json' \
-H 'API-KEY: HIDDEN'
Which will return a response with all software type objects that match the query, e.g
{
"page_size": 500,
"page_number": 1,
"page_results_count": 500,
"total_results_count": 9245,
"objects": [
{
"cpe": "cpe:2.3:a:google:chrome:103.0.5053.0:*:*:*:*:*:*:*",
"extensions": {
"extension-definition--82cad0bb-0906-5885-95cc-cafe5ee0a500": {
"extension_type": "toplevel-property-extension"
}
},
"id": "software--004a22d9-44f1-5fb3-8d1e-ca7ab979be9d",
"name": "Google Chrome 103.0.5053.0",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487",
"marking-definition--152ecfe1-5015-522b-97e4-86b60c57036d"
],
"spec_version": "2.1",
"swid": "EA548ED5-0EEC-4FFF-BECC-A878730D9DE9",
"type": "software",
"vendor": "google",
"version": "103.0.5053.0",
"x_cpe_struct": {
"cpe_version": "2.3",
"part": "a",
"vendor": "google",
"product": "chrome",
"version": "103.0.5053.0",
"update": "*",
"edition": "*",
"language": "*",
"sw_edition": "*",
"target_sw": "*",
"target_hw": "*",
"other": "*"
},
"x_created": "2022-09-07T17:07:26.587Z",
"x_modified": "2022-09-21T15:23:58.053Z",
"x_revoked": false
},
Taking a specific CPE ID, you can then get a bundle of all Vulnerabilities linked to it
curl -X 'GET' \
'https://api.vulmatch.com/v1/cpe/objects/cpe%3A2.3%3Aa%3Agoogle%3Achrome%3A103.0.5053.0%3A%2A%3A%2A%3A%2A%3A%2A%3A%2A%3A%2A%3A%2A/bundle/?types=vulnerability' \
-H 'accept: application/json' \
-H 'API-KEY: HIDDEN'
{
"page_size": 500,
"page_number": 1,
"page_results_count": 500,
"total_results_count": 823,
"objects": [
{
"created": "2025-06-03T00:15:21.043Z",
"created_by_ref": "identity--8869d5c4-7fbe-5af3-b0b2-13f4d10d8f40",
"description": "Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"extensions": {
"extension-definition--2c5c13af-ee92-5246-9ba7-0b958f8cd34a": {
"extension_type": "toplevel-property-extension"
},
"extension-definition--ec658473-1319-53b4-879f-488e47805554": {
"extension_type": "toplevel-property-extension"
}
},
"external_references": [
{
"source_name": "cve",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5419",
"external_id": "CVE-2025-5419"
},
{
"source_name": "cwe",
"url": "https://cwe.mitre.org/data/definitions/CWE-125.html",
"external_id": "CWE-125"
},
{
"source_name": "[email protected]",
"description": "Release Notes",
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html"
},
{
"source_name": "[email protected]",
"description": "Permissions Required",
"url": "https://issues.chromium.org/issues/420636529"
},
{
"source_name": "af854a3a-2127-422b-91ae-364da2661108",
"description": "Third Party Advisory",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5419"
},
{
"source_name": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"description": "US Government Resource",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-5419"
},
{
"source_name": "vulnStatus",
"description": "Analyzed"
}
],
"id": "vulnerability--209d33a5-48a8-5aeb-a4c2-043f5cb7a259",
"modified": "2025-10-24T14:06:46.073Z",
"name": "CVE-2025-5419",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487",
"marking-definition--562918ee-d5da-5579-b6a1-fae50cc6bad3"
],
"spec_version": "2.1",
"type": "vulnerability",
"x_cvss": {
"v3_1": [
{
"base_score": 8.8,
"base_severity": "HIGH",
"exploitability_score": 2.8,
"impact_score": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
]
},
"x_opencti_cisa_kev": true,
"x_opencti_cvss_base_score": 8.8,
"x_opencti_cvss_base_severity": "HIGH",
"x_opencti_cvss_vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"x_opencti_epss_percentile": 0.78767,
"x_opencti_epss_score": 0.01262
},
