{"uuid": "50cb42f5-7f6a-48d9-8216-fdf08b84a33e", "vulnerability": {"vulnId": "CVE-2024-7262", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "50cb42f5-7f6a-48d9-8216-fdf08b84a33e"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-09-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-09-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-09-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Kingsoft WPS Office Path Traversal Vulnerability | Affected: Kingsoft / WPS Office | Description: Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-09-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.;   https://nvd.nist.gov/vuln/detail/CVE-2024-7262"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "WPS Office", "due_date": "2024-09-24", "date_added": "2024-09-03", "vendorProject": "Kingsoft", "vulnerabilityName": "Kingsoft WPS Office Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-7262", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-7262"}]}
