{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T10:22:04.345","vulnerabilities":[{"cve":{"id":"CVE-2024-1209","sourceIdentifier":"security@wordfence.com","published":"2024-02-05T22:16:08.143","lastModified":"2026-04-08T18:20:30.497","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads."},{"lang":"es","value":"El complemento LearnDash LMS para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 4.10.1 incluida a través del acceso directo a archivos debido a una protección insuficiente de las tareas cargadas. Esto hace posible que atacantes no autenticados obtengan esas cargas."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:learndash:learndash:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.10.3","matchCriteriaId":"F60A9AD2-5715-460B-BDA8-D04EBB7CDF1E"}]}]}],"references":[{"url":"https://github.com/karlemilnikka/CVE-2024-1209","source":"security@wordfence.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.learndash.com/release-notes/","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7191955e-0db1-4ad1-878b-74f90ca59c91?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://github.com/karlemilnikka/CVE-2024-1209","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.learndash.com/release-notes/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7191955e-0db1-4ad1-878b-74f90ca59c91?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}