{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T04:11:20.963","vulnerabilities":[{"cve":{"id":"CVE-2024-9593","sourceIdentifier":"security@wordfence.com","published":"2024-10-18T18:15:04.540","lastModified":"2024-10-29T13:40:23.983","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified."},{"lang":"es","value":"El complemento Time Clock y el complemento Time Clock Pro para WordPress son vulnerables a la ejecución remota de código en versiones hasta la 1.2.2 (para Time Clock) y la 1.1.4 (para Time Clock Pro) incluida, a través de la función 'etimeclockwp_load_function_callback'. Esto permite que atacantes no autenticados ejecuten código en el servidor. No se pueden especificar los parámetros de la función invocada."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.7}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:*","versionEndIncluding":"1.1.4","matchCriteriaId":"B057E167-BA8B-4556-924E-9F1641ABB35F"},{"vulnerable":true,"criteria":"cpe:2.3:a:wpplugin:time_clock:*:*:*:*:-:wordpress:*:*","versionEndIncluding":"1.2.2","matchCriteriaId":"C1CE6396-E04F-47F3-B8D0-E1A0CB2DEEB8"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/time-clock/tags/1.2.2/includes/admin/ajax_functions_admin.php#L58","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3171046/time-clock#file40","source":"security@wordfence.com","tags":["Product"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/247e599a-74e2-41d5-a1ba-978a807e6544?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}