{"vulnerability": "cve-2024-12072", "sightings": [{"uuid": "68fa9736-5a97-4db0-bd58-584e662cb83e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12072", "type": "seen", "source": "https://t.me/cvedetector/12730", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12072 - Google Analytics Made Easy XSS Reflection in Analytics Cat for WordPress\", \n  \"Content\": \"CVE ID : CVE-2024-12072 \nPublished : Dec. 12, 2024, 6:15 a.m. | 42\u00a0minutes ago \nDescription : The Analytics Cat \u2013 Google Analytics Made Easy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T07:58:30.000000Z"}, {"uuid": "0f2c527a-b28b-44fd-b303-fd0046069d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12072", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113638371596006018", "content": "", "creation_timestamp": "2024-12-12T06:12:22.140128Z"}]}