{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T17:26:18.338","vulnerabilities":[{"cve":{"id":"CVE-2024-47820","sourceIdentifier":"security-advisories@github.com","published":"2024-11-18T17:15:11.777","lastModified":"2025-09-04T17:25:41.620","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading."},{"lang":"es","value":"MarkUs, una aplicación web para el envío y calificación de tareas de los estudiantes, es vulnerable a path traversal en versiones anteriores a la 2.4.8. Los instructores autenticados pueden descargar cualquier archivo en el servidor web en el que se ejecuta MarkUs, según los permisos de archivo. MarkUs v2.4.8 ha solucionado este problema. No hay workarounds disponibles a nivel de aplicación aparte de la actualización."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.8","matchCriteriaId":"12E4D0CA-53F2-426A-B51B-C25258C99325"}]}]}],"references":[{"url":"https://github.com/MarkUsProject/Markus/pull/7026","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/MarkUsProject/Markus/security/advisories/GHSA-wq6v-vx8c-8fj8","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}