{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T17:02:12.532","vulnerabilities":[{"cve":{"id":"CVE-2024-47059","sourceIdentifier":"security@mautic.org","published":"2024-09-18T22:15:04.650","lastModified":"2025-02-27T19:43:42.530","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.\n\nHowever when an incorrect username is provided alongside with a weak password, the application responds with ’Invalid credentials’ notification.\n\nThis difference could be used to perform username enumeration."},{"lang":"es","value":"Al iniciar sesión con el nombre de usuario correcto y una contraseña débil incorrecta, el usuario recibe una notificación que indica que su contraseña es demasiado débil. Sin embargo, cuando se proporciona un nombre de usuario incorrecto junto con una contraseña débil, la aplicación responde con una notificación de \"Credenciales no válidas\". Esta diferencia se puede utilizar para realizar la enumeración de nombres de usuario."}],"metrics":{"cvssMetricV31":[{"source":"security@mautic.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@mautic.org","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"218C24B5-AAED-49DE-BD4D-DA7B37D55744"}]}]}],"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-8vff-35qm-qjvv","source":"security@mautic.org","tags":["Vendor Advisory"]}]}}]}