{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:54:29.888","vulnerabilities":[{"cve":{"id":"CVE-2024-50672","sourceIdentifier":"cve@mitre.org","published":"2024-11-25T21:15:19.523","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application."},{"lang":"es","value":"Una vulnerabilidad de inyección NoSQL en Adapt Learning Adapt Authoring Tool &lt;= 0.11.3 permite a atacantes no autenticados restablecer las contraseñas de cuentas de usuario y administrador a través de la función \"Restablecer contraseña\". La vulnerabilidad se produce debido a una validación insuficiente de la entrada del usuario, que se utiliza como consulta en la función find() de Mongoose. Esto permite a los atacantes realizar una toma de control total de la cuenta de administrador. Los atacantes pueden utilizar los privilegios administrativos recién obtenidos para cargar un complemento personalizado para realizar la ejecución remota de código (RCE) en el servidor que aloja la aplicación web."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"references":[{"url":"https://github.com/adaptlearning/adapt_authoring","source":"cve@mitre.org"},{"url":"https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-50672","source":"cve@mitre.org"}]}}]}