{"vulnerability": "cve-2024-13407", "sightings": [{"uuid": "320c5650-3b9b-4115-8983-aa8d685fb4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13407", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdgd6xdme2j", "content": "", "creation_timestamp": "2025-03-14T10:40:49.739597Z"}, {"uuid": "a9189a42-ab12-4ff1-abb6-87c308394701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13407", "type": "seen", "source": "https://t.me/cvedetector/20279", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13407 - Omnipress WordPress Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13407 \nPublished : March 14, 2025, 8:15 a.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T10:51:25.000000Z"}]}