{"vulnerability": "CVE-2024-8478", "sightings": [{"uuid": "0dd0ba5e-cda6-4aba-b983-120fd55314f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8478", "type": "seen", "source": "https://t.me/cvedetector/5152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8478 - \"WordPress Affiliate Super Assistent Shortcode Code Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-8478 \nPublished : Sept. 10, 2024, 3:15 a.m. | 35\u00a0minutes ago \nDescription : The The Affiliate Super Assistent plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.5.3. This is due to the software allowing users to supply arbitrary shortcodes in comments when the 'Parse comments' option is enabled. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T05:51:54.000000Z"}]}