{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T10:23:39.145","vulnerabilities":[{"cve":{"id":"CVE-2024-4222","sourceIdentifier":"security@wordfence.com","published":"2024-05-16T10:15:08.687","lastModified":"2026-04-08T18:21:43.020","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options."},{"lang":"es","value":"El complemento Tutor LMS Pro para WordPress es vulnerable al acceso no autorizado a los datos, la modificación de los datos y la pérdida de datos debido a la falta de comprobación de la capacidad en varias funciones en todas las versiones hasta la 2.7.0 incluida. Esto permite que atacantes no autenticados agreguen, modifiquen o eliminen metadatos de usuario y opciones del complemento."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"2.7.1","matchCriteriaId":"887F64DA-F70D-4111-BE6A-4F908EB59A00"}]}]}],"references":[{"url":"https://www.themeum.com/product/tutor-lms/","source":"security@wordfence.com","tags":["Product"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/942fffb6-2719-4b70-9759-21b2d50002c5?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://www.themeum.com/product/tutor-lms/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/942fffb6-2719-4b70-9759-21b2d50002c5?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}