{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T04:48:51.859","vulnerabilities":[{"cve":{"id":"CVE-2024-24817","sourceIdentifier":"security-advisories@github.com","published":"2024-02-22T18:15:48.587","lastModified":"2025-02-05T21:59:51.047","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on the open-source discussion platform Discourse. Prior to version 0.4, event invitees created in topics in private categories or PMs (private messages) can be retrieved by anyone, even if they're not logged in. This problem is resolved in version 0.4 of the discourse-calendar plugin. While no known workaround is available, putting the site behind `login_required` will disallow this endpoint to be used by anonymous users, but logged in users can still get the list of invitees in the private topics."},{"lang":"es","value":"Discourse Calendar agrega la capacidad de crear un calendario dinámico en la primera publicación de un tema en la plataforma de discusión de código abierto Discourse. Antes de la versión 0.4, cualquier persona puede recuperar los invitados a eventos creados en temas en categorías privadas o MP (mensajes privados), incluso si no han iniciado sesión. Este problema se resuelve en la versión 0.4 del complemento de calendario de discurso. Si bien no hay un workaround disponible, colocar el sitio detrás de `login_required` no permitirá que usuarios anónimos utilicen este endpoint, pero los usuarios que hayan iniciado sesión aún pueden obtener la lista de invitados en los temas privados."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:discourse:calendar:*:*:*:*:*:*:*:*","versionEndExcluding":"0.4","matchCriteriaId":"B76C6885-834A-41E6-98BF-2122BB83BBF6"}]}]}],"references":[{"url":"https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}