{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T21:26:33.484","vulnerabilities":[{"cve":{"id":"CVE-2024-13407","sourceIdentifier":"security@wordfence.com","published":"2025-03-14T08:15:11.620","lastModified":"2025-03-21T14:44:58.060","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to."},{"lang":"es","value":"El complemento Omnipress para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 1.5.4 incluida, a través del bloque de megamenú debido a restricciones insuficientes sobre qué publicaciones se pueden incluir. Esto permite que atacantes autenticados, con acceso de colaborador o superior, extraigan datos de publicaciones protegidas con contraseña, privadas o en borrador a las que no deberían tener acceso."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:omnipressteam:omnipress:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.5.5","matchCriteriaId":"534D7874-3F4F-41AF-B3BF-AD2D71EA9D46"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/fa17f78a-5e4a-441e-bbbb-d13bad648c39?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}