{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T12:01:43.893","vulnerabilities":[{"cve":{"id":"CVE-2024-0864","sourceIdentifier":"cvd@cert.pl","published":"2024-02-29T13:15:07.260","lastModified":"2025-04-24T17:01:31.400","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the aforementioned plugin."},{"lang":"es","value":"Habilitar el complemento Simple Ajax Uploader incluido en el software de código abierto Laragon permite un ataque de ejecución remota de código (RCE) a través de una validación de entrada incorrecta en un archivo file_upload.php que sirve como ejemplo. De forma predeterminada, Laragon no es vulnerable hasta que un usuario decide utilizar el complemento antes mencionado."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:laragon:laragon:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.0","matchCriteriaId":"EFE94F3C-C511-4291-88EB-27C6B7202222"}]}]}],"references":[{"url":"https://cert.pl/en/posts/2024/02/CVE-2024-0864","source":"cvd@cert.pl","tags":["Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/02/CVE-2024-0864","source":"cvd@cert.pl","tags":["Third Party Advisory"]},{"url":"https://laragon.org/","source":"cvd@cert.pl","tags":["Product"]},{"url":"https://cert.pl/en/posts/2024/02/CVE-2024-0864","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/02/CVE-2024-0864","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://laragon.org/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}