{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T22:55:08.435","vulnerabilities":[{"cve":{"id":"CVE-2024-13818","sourceIdentifier":"security@wordfence.com","published":"2025-02-21T04:15:09.993","lastModified":"2026-04-08T18:20:18.417","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.4 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information about users contained in the exposed log files."},{"lang":"es","value":"El complemento Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form &amp; Content Restriction para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 3.8.3.9 incluida, a través de archivos de registro expuestos públicamente. Esto permite que atacantes no autenticados vean información potencialmente confidencial sobre los usuarios contenida en los archivos de registro expuestos."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"3.8.3.9","matchCriteriaId":"D58901A0-2C93-4786-99FB-713D24E4D3BB"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/pie-register/trunk/classes/base_variables.php#L68","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3255985%40pie-register%2Ftrunk&old=3246810%40pie-register%2Ftrunk&sfp_email=&sfph_mail=","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/768730c1-a70e-432d-a234-4ce2b8aec424?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}