{"uuid": "6229641f-d9e8-4443-8594-f2d324a08939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-27956", "type": "exploited", "source": "https://t.me/MrVGunz/1118", "content": "\u26a0\ufe0f \u062a\u0648\u062c\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648\u0631\u062f\u067e\u0631\u0633!\n\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc SQL injection (CVE-2024-27956) \u062f\u0631 \u0627\u0641\u0632\u0648\u0646\u0647 WP-Automatic \u062f\u0631 \u062d\u0627\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0641\u0639\u0627\u0644 \u0627\u0633\u062a. \u0628\u0627 \u0634\u062f\u062a \u062d\u062f\u0627\u06a9\u062b\u0631\u06cc 9.9 \u0627\u0632 10\u060c \u0627\u06cc\u0646 \u0628\u0627\u06af \u0627\u0645\u06a9\u0627\u0646 \u062a\u0635\u0631\u0641 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a \u0648 \u0641\u0639\u0627\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u062e\u0628\u06cc\u062b \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\u062c\u0632\u0626\u06cc\u0627\u062a: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647: https://github.com/diego-tella/CVE-2024-27956-RCE\n\n\ud83d\udea8 Attention WordPress users! \n \nA critical SQL injection vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.\nDetails: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html\nExploit: https://github.com/diego-tella/CVE-2024-27956-RCE", "creation_timestamp": "2024-05-16T23:12:51.000000Z"}