{"api_version":"1","generated_at":"2026-04-23T09:53:20+00:00","cve":"CVE-2024-1769","urls":{"html":"https://cve.report/CVE-2024-1769","api":"https://cve.report/api/cve/CVE-2024-1769.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-1769","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-1769"},"summary":{"title":"JM Twitter Cards <= 14 - Information Exposure via Meta Description","description":"The JM Twitter Cards plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 14 via the meta description data. This makes it possible for unauthenticated attackers to view password protected post content when viewing the page source.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2024-03-05 02:15:27","updated_at":"2026-04-08 19:20:51"},"problem_types":["CWE-200","NVD-CWE-noinfo","CWE-200 CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3044066%40jm-twitter-cards&new=3044066%40jm-twitter-cards&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3044066%40jm-twitter-cards&new=3044066%40jm-twitter-cards&sfp_email=&sfph_mail=","refsource":"security@wordfence.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/b48e5973-6923-47cc-a660-ecc989f540f8?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/b48e5973-6923-47cc-a660-ecc989f540f8?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://wordpress.org/plugins/jm-twitter-cards/","name":"https://wordpress.org/plugins/jm-twitter-cards/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-1769","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1769","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"jmlapam","product":"JM Twitter Cards","version":"affected 14 semver","platforms":[]},{"source":"ADP","vendor":"jmlapam","product":"jm_twitter_cards","version":"affected 12 custom","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-03-04T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Krzysztof Zając","lang":"en"}],"nvd_cpes":[{"cve_year":"2024","cve_id":"1769","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jmlapam","cpe5":"jm_twitter_cards","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"1769","cve":"CVE-2024-1769","epss":"0.003170000","percentile":"0.547780000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:17"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:a:jmlapam:jm_twitter_cards:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"jm_twitter_cards","vendor":"jmlapam","versions":[{"lessThanOrEqual":"12","status":"affected","version":"0","versionType":"custom"}]}],"metrics":[{"other":{"content":{"id":"CVE-2024-1769","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-03-06T17:03:46.951763Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-04-16T15:56:53.437Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-01T18:48:21.977Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/b48e5973-6923-47cc-a660-ecc989f540f8?source=cve"},{"tags":["x_transferred"],"url":"https://wordpress.org/plugins/jm-twitter-cards/"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"JM Twitter Cards","vendor":"jmlapam","versions":[{"lessThanOrEqual":"14","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Krzysztof Zając"}],"descriptions":[{"lang":"en","value":"The JM Twitter Cards plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 14 via the meta description data. This makes it possible for unauthenticated attackers to view password protected post content when viewing the page source."}],"metrics":[{"cvssV3_1":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:16:58.346Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/b48e5973-6923-47cc-a660-ecc989f540f8?source=cve"},{"url":"https://wordpress.org/plugins/jm-twitter-cards/"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3044066%40jm-twitter-cards&new=3044066%40jm-twitter-cards&sfp_email=&sfph_mail="}],"timeline":[{"lang":"en","time":"2024-03-04T00:00:00.000Z","value":"Disclosed"}],"title":"JM Twitter Cards <= 14 - Information Exposure via Meta Description"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2024-1769","datePublished":"2024-03-05T01:56:03.244Z","dateReserved":"2024-02-22T17:40:41.847Z","dateUpdated":"2026-04-08T17:16:58.346Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-03-05 02:15:27","lastModifiedDate":"2026-04-08 19:20:51","problem_types":["CWE-200","NVD-CWE-noinfo","CWE-200 CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jmlapam:jm_twitter_cards:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"14.1.0","matchCriteriaId":"0105D84A-9CF6-4016-B77A-E67015FFEF8A"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"1769","Ordinal":"1","Title":"JM Twitter Cards <= 14 - Information Exposure via Meta Descripti","CVE":"CVE-2024-1769","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"1769","Ordinal":"1","NoteData":"The JM Twitter Cards plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 14 via the meta description data. This makes it possible for unauthenticated attackers to view password protected post content when viewing the page source.","Type":"Description","Title":"JM Twitter Cards <= 14 - Information Exposure via Meta Descripti"}]}}}