{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T07:51:39.031","vulnerabilities":[{"cve":{"id":"CVE-2024-50356","sourceIdentifier":"security-advisories@github.com","published":"2024-10-31T18:15:05.750","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug."},{"lang":"es","value":"Press, una aplicación personalizada de Frappe que ejecuta Frappe Cloud, administra la infraestructura, la suscripción, el mercado y el software como servicio (SaaS). Cualquiera que tenga acceso a la bandeja de entrada de correo sin pasar por la autenticación de dos factores podría restablecer la contraseña, aunque no podrían iniciar sesión sin pasar por la autenticación de dos factores. Solo los usuarios que hayan habilitado la autenticación de dos factores se ven afectados. El commit ba0007c28ac814260f836849bc07d29beea7deb6 corrige este error."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N","baseScore":0.0,"baseSeverity":"NONE","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":0.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-640"}]}],"references":[{"url":"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6","source":"security-advisories@github.com"},{"url":"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9","source":"security-advisories@github.com"}]}}]}