{"vulnerability": "CVE-2024-1343", "sightings": [{"uuid": "86e5dd7b-d8cd-4447-bdf5-3d551f22781b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13438", "type": "seen", "source": "Telegram/Rht8IwyMcWoURy3dRaUtUj1u7ZA0X_bsNwd8_SBs8vmpYGIX", "content": "", "creation_timestamp": "2025-02-18T11:39:00.000000Z"}, {"uuid": "ffb33542-ef42-4550-b23f-5f902f4f6725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "Telegram/xRrBlEv8FAKf0VUiyHLDPzvkiGoqWIhVRbJBlV078l1QTDOv", "content": "", "creation_timestamp": "2025-02-15T23:50:18.000000Z"}, {"uuid": "9aca9158-6d43-4be6-86aa-722d5c29eeee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1343", "type": "seen", "source": "https://t.me/arpsyndicate/3673", "content": "#ExploitObserverAlert\n\nCVE-2024-1343\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1343. A weak permission was found in the backup directory in LaborOfficeFree affecting version 19.10. This vulnerability allows any authenticated user to read backup files in the directory '%programfiles(x86)% LaborOfficeFree BackUp'.", "creation_timestamp": "2024-02-20T18:53:16.000000Z"}, {"uuid": "35e0483f-163b-4670-b66f-3218e4409823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1343", "type": "seen", "source": "https://t.me/ctinow/187653", "content": "https://ift.tt/hPiCdaR\nCVE-2024-1343", "creation_timestamp": "2024-02-19T13:31:08.000000Z"}, {"uuid": "a34bb64b-bdfa-44ac-930a-e6090e08789c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1343", "type": "seen", "source": "https://t.me/ctinow/187649", "content": "https://ift.tt/hPiCdaR\nCVE-2024-1343", "creation_timestamp": "2024-02-19T13:26:58.000000Z"}, {"uuid": "f4aa0972-4b65-41d2-8ca6-0b9b220bd634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13435", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990205053620079", "content": "", "creation_timestamp": "2025-02-12T09:28:15.536404Z"}, {"uuid": "2f0cccc9-1f6a-49d1-bbde-12eb40da59f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13437", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990264058169600", "content": "", "creation_timestamp": "2025-02-12T09:43:18.857597Z"}, {"uuid": "8d0fd5c5-de81-44f8-a437-2290ad3d0903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13435", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwwvibcu2p", "content": "", "creation_timestamp": "2025-02-12T10:15:49.702053Z"}, {"uuid": "cb9ba4c2-ee9b-4fe2-a7fd-ffe70b6a8ef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13437", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwwyf34h2x", "content": "", "creation_timestamp": "2025-02-12T10:15:52.852088Z"}, {"uuid": "7e18789a-84a1-44d4-b594-a46f5fc1e1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13436", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk3lxsxpat2m", "content": "", "creation_timestamp": "2025-03-11T08:00:31.735094Z"}, {"uuid": "b6f74e0d-f690-4c52-b589-2d1c8bd87773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li7p2g22qy2o", "content": "", "creation_timestamp": "2025-02-15T12:15:55.652755Z"}, {"uuid": "7e0f41b7-21f2-45d9-baa5-510fc4451ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13438", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ligmcvmuug2h", "content": "", "creation_timestamp": "2025-02-18T06:15:37.601906Z"}, {"uuid": "c64a8176-1122-4aca-bd3d-d492903df928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13432", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13432\n\ud83d\udd39 Description: The Webcamconsult plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-18T07:05:06.715Z\n\ud83d\udccf Modified: 2025-01-18T07:05:06.715Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/3cdad887-dafa-4cf8-ac78-87b9b9b989e2?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3223211%40webcamconsult&amp;new=3223211%40webcamconsult&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-18T07:57:29.000000Z"}, {"uuid": "ba5afe81-c2e1-49c6-a4d7-52ed9006fdb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13435", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13435\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: The Ebook Downloader plugin for WordPress is vulnerable to SQL Injection via the 'download' parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-02-12T12:30:46Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13435\n2. https://plugins.trac.wordpress.org/browser/ebook-downloader/trunk/ebook_plugin.php#L278\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/51b0c1e5-08f7-44b3-8518-6b0902b84758?source=cve", "creation_timestamp": "2025-02-12T13:14:27.000000Z"}, {"uuid": "deab81c3-4f1d-4ef0-9227-9a65aaaec307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13435", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4075", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:10.727\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/browser/ebook-downloader/trunk/ebook_plugin.php#L278\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/51b0c1e5-08f7-44b3-8518-6b0902b84758?source=cve", "creation_timestamp": "2025-02-12T11:11:35.000000Z"}, {"uuid": "75bd5719-d73b-4c22-913f-e63dc7687df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13437", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4074", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13437\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:10.920\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://wordpress.org/plugins/book-a-room/\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/bfef57b6-26b1-433b-9037-46f908422f72?source=cve", "creation_timestamp": "2025-02-12T11:11:26.000000Z"}, {"uuid": "880f19eb-3ee4-41a6-ad46-c7598f433a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13437", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4089", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13437\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: The Book a Room plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9. This is due to missing or incorrect nonce validation on the 'bookaroom_Settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-12T12:30:47Z\n\ud83d\udccf Modified: 2025-02-12T12:30:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13437\n2. https://wordpress.org/plugins/book-a-room\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/bfef57b6-26b1-433b-9037-46f908422f72?source=cve", "creation_timestamp": "2025-02-12T13:11:08.000000Z"}, {"uuid": "86375089-d60a-449b-a865-d3ae4439003c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4563", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13439\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-15T12:15:30.300\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.svn.wordpress.org/tlp-team/tags/4.4.7/app/Controllers/Admin/Ajax/Settings.php\n2. https://plugins.trac.wordpress.org/changeset/3239948/tlp-team/trunk/app/Controllers/Admin/Ajax/Settings.php\n3. https://plugins.trac.wordpress.org/changeset/3239948/tlp-team/trunk/app/Controllers/Admin/Ajax/Skill.php\n4. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3239948%40tlp-team&amp;new=3239948%40tlp-team&amp;sfp_email=&amp;sfph_mail=\n5. https://www.wordfence.com/threat-intel/vulnerabilities/id/46951d8d-f8f1-4fb5-b02a-1a19edd154e6?source=cve", "creation_timestamp": "2025-02-15T13:11:24.000000Z"}, {"uuid": "5e7f6269-fc3f-47f4-ac77-685959948e66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "Telegram/2DEtsJwuz9F6K8ZqQ1-7qkpu6ceUAHyx0J6wRgc2mL0W7Dzj", "content": "", "creation_timestamp": "2025-02-24T14:08:42.000000Z"}, {"uuid": "9e2dc556-c80e-4c41-bcaf-b3858ec08c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13435", "type": "seen", "source": "https://t.me/cvedetector/17848", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13435 - \"WordPress Ebook Downloader SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-13435 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The Ebook Downloader plugin for WordPress is vulnerable to SQL Injection via the 'download' parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:52.000000Z"}, {"uuid": "b5e28107-c08e-4bfb-b935-bbbd2b7cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13437", "type": "seen", "source": "https://t.me/cvedetector/17846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13437 - WordPress Book a Room CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13437 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The Book a Room plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9. This is due to missing or incorrect nonce validation on the 'bookaroom_Settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:51.000000Z"}, {"uuid": "789b9f28-b4ab-458d-a34a-918e2465d5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13432", "type": "seen", "source": "https://t.me/cvedetector/15795", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13432 - WordPress Webcamconsult CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13432 \nPublished : Jan. 18, 2025, 7:15 a.m. | 18\u00a0minutes ago \nDescription : The Webcamconsult plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T08:42:37.000000Z"}, {"uuid": "58a859e4-6c59-4127-8d54-2f2e84d55b3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13434", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113841828810932968", "content": "", "creation_timestamp": "2025-01-17T04:34:12.968193Z"}, {"uuid": "80270e9d-0a2a-47f4-b0f7-0a722c3bf7d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13434", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfvzzy7nmd2h", "content": "", "creation_timestamp": "2025-01-17T05:15:31.791156Z"}, {"uuid": "4ddc0145-26c4-439d-9247-e4c8aa2e8e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13434", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfw3vhzf3f2i", "content": "", "creation_timestamp": "2025-01-17T05:48:48.363561Z"}, {"uuid": "23b2acab-0d5d-4bf7-a329-05fb918f26f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114007668643843070", "content": "", "creation_timestamp": "2025-02-15T11:29:27.960822Z"}, {"uuid": "73bb26f8-0ba8-4034-9c02-6d8be5ed58c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13438", "type": "seen", "source": "https://t.me/cvedetector/18278", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13438 - \"SpeedSize WordPress Plugin CSRF Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13438 \nPublished : Feb. 18, 2025, 6:15 a.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : The SpeedSize Image &amp; Video AI-Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.1. This is due to missing or incorrect nonce validation on the 'speedsize_clear_css_cache_action' function. This makes it possible for unauthenticated attackers to clear the plugins cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T09:16:48.000000Z"}, {"uuid": "8c908b2e-3117-4be6-9cd2-d993b81b7d05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13434", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2095", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13434\n\ud83d\udd39 Description: The WP Inventory Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-17T04:30:19.689Z\n\ud83d\udccf Modified: 2025-01-17T04:30:19.689Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3069d4-12b8-4949-9daf-0e01590799da?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3223184%40wp-inventory-manager&amp;new=3223184%40wp-inventory-manager&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-17T04:56:28.000000Z"}, {"uuid": "87fca615-1ed1-4baf-8638-e83f02a60d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13438", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4753", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13438\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The SpeedSize Image &amp; Video AI-Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.1. This is due to missing or incorrect nonce validation on the 'speedsize_clear_css_cache_action' function. This makes it possible for unauthenticated attackers to clear the plugins cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-18T05:22:26.550Z\n\ud83d\udccf Modified: 2025-02-18T05:22:26.550Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/1404c675-49b3-48a5-8aac-826c58755b8e?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3236368%40speedsize-ai-image-optimizer&amp;new=3236368%40speedsize-ai-image-optimizer&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-02-18T08:00:37.000000Z"}, {"uuid": "bd1f00b7-594a-4171-8469-3160ff80dc62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://t.me/cvedetector/18171", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13439 - WordPress Team Members Showcase Plugin Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-13439 \nPublished : Feb. 15, 2025, 12:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : The Team \u2013 Team Members Showcase Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T15:12:00.000000Z"}, {"uuid": "00899658-1b7c-43e5-b491-89c9ece312e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13434", "type": "seen", "source": "https://t.me/cvedetector/15678", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13434 - \"WordPress WP Inventory Manager Reflected Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13434 \nPublished : Jan. 17, 2025, 5:15 a.m. | 20\u00a0minutes ago \nDescription : The WP Inventory Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T06:45:30.000000Z"}, {"uuid": "dc4fcffe-bc30-47fd-b834-1baf68d72976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13432", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfyrberptb2j", "content": "", "creation_timestamp": "2025-01-18T07:16:35.454503Z"}, {"uuid": "e2bd081e-166e-41f4-b2f9-fd1bb3a4aa90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13433", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfyrbhclqh2c", "content": "", "creation_timestamp": "2025-01-18T07:16:37.963578Z"}, {"uuid": "c5447c47-fca5-40e5-8bd7-c3a72f7e53da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13432", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113848157418768033", "content": "", "creation_timestamp": "2025-01-18T07:23:39.881184Z"}, {"uuid": "95b3f050-dcf1-44db-b1fd-04b2b372e2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13433", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113848157433697973", "content": "", "creation_timestamp": "2025-01-18T07:23:40.037689Z"}, {"uuid": "6259e462-6636-4430-aeee-012883c601c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13432", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfysjx4dc52i", "content": "", "creation_timestamp": "2025-01-18T07:39:20.040698Z"}, {"uuid": "34f650e1-5897-4f26-9b3c-944321d9e1c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13433", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfysjxh3pl25", "content": "", "creation_timestamp": "2025-01-18T07:39:21.608603Z"}, {"uuid": "3625ba5a-c514-4551-8031-8138a30ba8ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li7yrm57ws2a", "content": "", "creation_timestamp": "2025-02-15T15:09:58.246336Z"}, {"uuid": "4e68e6d2-171d-47ca-ac43-69e8a70ded8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13438", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ligxjwvvu72a", "content": "", "creation_timestamp": "2025-02-18T09:36:25.541343Z"}, {"uuid": "3c741af2-bcd4-4d4c-a9a9-359587d52e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13436", "type": "seen", "source": "https://t.me/cvedetector/20033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13436 - Appsero Helper WordPress CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13436 \nPublished : March 11, 2025, 4:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : The Appsero Helper plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.2. This is due to missing or incorrect nonce validation on the 'appsero_helper' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T07:35:36.000000Z"}, {"uuid": "25624142-fe90-4a93-9d99-ea7189824049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13433", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2278", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13433\n\ud83d\udd39 Description: The Utilities for MTG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mtglink' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-01-18T07:05:11.206Z\n\ud83d\udccf Modified: 2025-01-18T07:05:11.206Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/fe82b7ee-d09b-4eeb-a7d6-914b8b24368b?source=cve\n2. https://wordpress.org/plugins/utilities-for-mtg/", "creation_timestamp": "2025-01-18T07:57:15.000000Z"}, {"uuid": "658a2bf4-f0ca-4390-a611-80bf780285bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13439", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4556", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13439\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: The Team \u2013 Team Members Showcase Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.\n\ud83d\udccf Published: 2025-02-15T12:30:50Z\n\ud83d\udccf Modified: 2025-02-15T12:30:50Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13439\n2. https://plugins.svn.wordpress.org/tlp-team/tags/4.4.7/app/Controllers/Admin/Ajax/Settings.php\n3. https://plugins.trac.wordpress.org/changeset/3239948/tlp-team/trunk/app/Controllers/Admin/Ajax/Settings.php\n4. https://plugins.trac.wordpress.org/changeset/3239948/tlp-team/trunk/app/Controllers/Admin/Ajax/Skill.php\n5. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3239948%40tlp-team&amp;new=3239948%40tlp-team&amp;sfp_email=&amp;sfph_mail=\n6. https://www.wordfence.com/threat-intel/vulnerabilities/id/46951d8d-f8f1-4fb5-b02a-1a19edd154e6?source=cve", "creation_timestamp": "2025-02-15T13:11:16.000000Z"}, {"uuid": "ca74766c-a20e-4d01-a626-286e610f481f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13430", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13430\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: The Page Builder: Pagelayer \u2013 Drag and Drop website builder plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.8 via the 'pagelayer_builder_posts_shortcode' function due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private posts that they should not have access to.\n\ud83d\udccf Published: 2025-03-12T08:21:37.013Z\n\ud83d\udccf Modified: 2025-03-12T08:21:37.013Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/1de8da4c-dee7-4d59-a475-a969008aa0d4?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3252081/pagelayer", "creation_timestamp": "2025-03-12T08:50:00.000000Z"}, {"uuid": "6bcd7770-9b53-441f-b282-cf0d6091709f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13431", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6807", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13431\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the accent_color and background parameter in all versions up to, and including, 1.6.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-03-07T08:21:28.499Z\n\ud83d\udccf Modified: 2025-03-07T08:21:28.499Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e3e5dd-b9f1-4d24-98cc-b6ab319434e4?source=cve\n2. https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/booking-app-new/iframe-inner.php#L182\n3. https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/booking-app-new/iframe-inner.php#L189\n4. https://plugins.trac.wordpress.org/changeset/3246760/simply-schedule-appointments/trunk/booking-app-new/iframe-inner.php", "creation_timestamp": "2025-03-07T08:34:50.000000Z"}, {"uuid": "9f46fdcf-2456-41ad-a797-17f6b45c7289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13433", "type": "seen", "source": "https://t.me/cvedetector/15785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13433 - \"Wordpress Utilities for MTG Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13433 \nPublished : Jan. 18, 2025, 7:15 a.m. | 18\u00a0minutes ago \nDescription : The Utilities for MTG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mtglink' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T08:42:23.000000Z"}]}