{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T08:08:25.574","vulnerabilities":[{"cve":{"id":"CVE-2024-47057","sourceIdentifier":"security@mautic.org","published":"2025-05-28T18:15:25.063","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SummaryThis advisory addresses a security vulnerability in Mautic related to the \"Forget your password\" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames.\n\nUser Enumeration via Timing Attack: A user enumeration vulnerability exists in the \"Forget your password\" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack.\n\nMitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence."},{"lang":"es","value":"Resumen: Este aviso aborda una vulnerabilidad de seguridad en Mautic relacionada con la función \"Olvida tu contraseña\". Esta vulnerabilidad podría ser explotada por usuarios no autenticados para enumerar nombres de usuario válidos. Enumeración de usuarios mediante un ataque de tiempo: Existe una vulnerabilidad de enumeración de usuarios en la función \"Olvida tu contraseña\". Las diferencias en los tiempos de respuesta entre usuarios existentes y no existentes, junto con la falta de limitación de solicitudes, permiten a un atacante determinar la existencia de nombres de usuario mediante un ataque de tiempo. Mitigación: Actualice a una versión que aborde esta vulnerabilidad de tiempo, donde las respuestas de restablecimiento de contraseña se normalizan para responder simultáneamente, independientemente de la existencia del usuario."}],"metrics":{"cvssMetricV31":[{"source":"security@mautic.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@mautic.org","type":"Secondary","description":[{"lang":"en","value":"CWE-203"}]}],"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-424x-cxvh-wq9p","source":"security@mautic.org"}]}}]}