{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:28:16.190","vulnerabilities":[{"cve":{"id":"CVE-2024-8268","sourceIdentifier":"security@wordfence.com","published":"2024-09-10T03:15:03.690","lastModified":"2024-09-26T16:15:31.053","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Frontend Dashboard plugin for WordPress is vulnerable to unauthorized code execution due to insufficient filtering on callable methods/functions via the ajax_request() function in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to call arbitrary functions that can be leverage for privilege escalation by changing user's passwords."},{"lang":"es","value":"El complemento Frontend Dashboard para WordPress es vulnerable a la ejecución de código no autorizado debido a un filtrado insuficiente de los métodos y funciones invocables a través de la función ajax_request() en todas las versiones hasta la 2.2.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, invoquen funciones arbitrarias que pueden aprovecharse para la escalada de privilegios mediante el cambio de contraseñas de los usuarios."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:buffercode:frontend_dashboard:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.2.5","matchCriteriaId":"10C7FC76-DD4E-4277-BB39-8C7386FE1DF9"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/frontend-dashboard/tags/2.2.4/route/class-fed-request.php#L29","source":"security@wordfence.com","tags":["Issue Tracking"]},{"url":"https://plugins.trac.wordpress.org/changeset/3147868/frontend-dashboard/tags/2.2.5/route/class-fed-request.php?old=3048034&old_path=frontend-dashboard%2Ftags%2F2.2.4%2Froute%2Fclass-fed-request.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7d66694a-c99f-44f8-8004-1a47ad9f9250?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}