{"uuid": "29274eec-f851-4497-81ce-ab4a84368a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9265\n\ud83c\udfe2 Vendor: coderevolution\n\ud83d\udda5\ufe0f Product: echo_rss_feed_post_generator\n\ud83d\udd39 Description: The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.\n\ud83d\udccf Published: 2024-10-01T00:00:00Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/rss-feed-post-generator-echo/wordpress-echo-rss-feed-post-generator-plugin-5-4-6-unauthenticated-privilege-escalation-vulnerability", "creation_timestamp": "2025-02-08T23:20:33.000000Z"}