{"vulnerability": "cve-2024-12419", "sightings": [{"uuid": "0a136dd9-8be7-4dda-875a-4ca4a94a8b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12419", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785064242184668", "content": "", "creation_timestamp": "2025-01-07T03:58:14.427384Z"}, {"uuid": "a585bb95-fdac-42c2-9f81-bed43b69e45b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12419", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/290", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12419\n\ud83d\udd39 Description: The The Design for Contact Form 7 Style WordPress Plugin \u2013 CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains.\n\ud83d\udccf Published: 2025-01-07T03:21:55.752Z\n\ud83d\udccf Modified: 2025-01-07T03:21:55.752Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5d78ea71-5886-488e-a660-0dc25129a8b6?source=cve\n2. https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L405\n3. https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L300\n4. https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L295", "creation_timestamp": "2025-01-07T03:36:58.000000Z"}, {"uuid": "f6c4966a-84a5-4e06-8b59-f7e575f42670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12419", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4rzutskb2m", "content": "", "creation_timestamp": "2025-01-07T04:15:44.768886Z"}, {"uuid": "2f7e01ee-6f6e-43fc-bbd5-2bfa881f14dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12419", "type": "seen", "source": "https://t.me/cvedetector/14434", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12419 - \"WordPress CF7 WOW Styler Arbitrary Shortcode Execution &amp; XSS Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12419 \nPublished : Jan. 7, 2025, 4:15 a.m. | 39\u00a0minutes ago \nDescription : The The Design for Contact Form 7 Style WordPress Plugin \u2013 CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T06:19:44.000000Z"}]}