{"uuid": "82502bcc-89e7-4c38-a17a-031e009c9c17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8791", "type": "seen", "source": "https://t.me/cvedetector/6238", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8791 - Charitable WordPress Donations Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-8791 \nPublished : Sept. 24, 2024, 3:15 a.m. | 25\u00a0minutes ago \nDescription : The Donation Forms by Charitable \u2013 Donations Plugin &amp; Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. This is due to the plugin not properly verifying a user's identity when the ID parameter is supplied through the update_core_user() function. This makes it possible for unauthenticated attackers to update the email address and password of arbitrary user accounts, including administrators, which can then be used to log in to those user accounts. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-24T05:42:08.000000Z"}