{"uuid": "5f505a0a-6e8f-4f4c-9d22-c6ffb35e6f74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12042", "type": "seen", "source": "https://t.me/cvedetector/12845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12042 - WordPress MStore Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12042 \nPublished : Dec. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : The MStore API \u2013 Create Native Android &amp; iOS Apps On The Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the profile picture upload functionality in all versions up to, and including, 4.16.4 due to insufficient file type validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload HTML files with arbitrary web scripts that will execute whenever a user accesses the file. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T10:45:09.000000Z"}