{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T20:43:43.479","vulnerabilities":[{"cve":{"id":"CVE-2024-1210","sourceIdentifier":"security@wordfence.com","published":"2024-02-05T22:16:08.310","lastModified":"2026-04-08T18:20:30.657","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via API. This makes it possible for unauthenticated attackers to obtain access to quizzes."},{"lang":"es","value":"El complemento LearnDash LMS para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 4.10.1 incluida a través de API. Esto hace posible que atacantes no autenticados obtengan acceso a los cuestionarios."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:learndash:learndash:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.10.2","matchCriteriaId":"1209AC51-4B5E-486D-B0E9-3FA36CF54B79"}]}]}],"references":[{"url":"https://github.com/karlemilnikka/CVE-2024-1208-and-CVE-2024-1210","source":"security@wordfence.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.learndash.com/release-notes/","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/61ca5ab6-5fe9-4313-9b0d-8736663d0e89?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://github.com/karlemilnikka/CVE-2024-1208-and-CVE-2024-1210","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.learndash.com/release-notes/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/61ca5ab6-5fe9-4313-9b0d-8736663d0e89?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}