{"uuid": "8f9da545-ad4d-47d6-9062-f436b561079a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8243", "type": "seen", "source": "https://t.me/cvedetector/22540", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8243 - WordPress/Upgrade Time Out Plugin Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-8243 \nPublished : April 9, 2025, 6:15 a.m. | 1\u00a0hour, 45\u00a0minutes ago \nDescription : The WordPress/Plugin Upgrade Time Out Plugin WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T10:04:55.000000Z"}