{"uuid": "0a35b259-e4ef-44f6-99b9-dbfb7d4aca00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12637", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12637\n\ud83d\udd39 Description: The Moving Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.05 via the export functionality. The JSON files are stored in predictable locations with guessable file names when exporting user data. This could allow unauthenticated attackers to extract sensitive user data, for instance, email addresses, hashed passwords, and IP addresses.\n\ud83d\udccf Published: 2025-01-17T07:01:28.253Z\n\ud83d\udccf Modified: 2025-01-17T07:01:28.253Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/8209761c-2cfe-49b9-ab4c-49a9a13b5dcf?source=cve\n2. https://wordpress.org/plugins/moving-users/", "creation_timestamp": "2025-01-17T07:56:37.000000Z"}