{"vulnerability": "cve-2024-1388", "sightings": [{"uuid": "6892850e-bbaf-4f9b-911b-f8a8f1f6e472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13884", "type": "seen", "source": "https://t.me/cvedetector/20201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13884 - Limit Bio WordPress Stored Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-13884 \nPublished : March 13, 2025, 6:15 a.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : The Limit Bio WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T08:55:52.000000Z"}, {"uuid": "3376ad83-f35e-4839-bf19-47c404fa0674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13885", "type": "seen", "source": "https://t.me/cvedetector/20197", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13885 - WordPress e-Customers Beta XSS\", \n  \"Content\": \"CVE ID : CVE-2024-13885 \nPublished : March 13, 2025, 6:15 a.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : The WP e-Customers Beta WordPress plugin through 0.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T08:55:49.000000Z"}, {"uuid": "7f3e61c4-5716-4961-ae65-375463889540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13887", "type": "seen", "source": "https://t.me/cvedetector/20186", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13887 - WordPress Business Directory Plugin Unauthenticated Image Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13887 \nPublished : March 13, 2025, 4:15 a.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : The Business Directory Plugin \u2013 Easy Listing Directories for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.14 via the 'ajax_listing_submit_image_upload' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to add arbitrary images to listings. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T07:15:17.000000Z"}, {"uuid": "5dfc4e6e-6969-434d-9854-5f3608bd4aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13882", "type": "seen", "source": "https://t.me/cvedetector/19889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13882 - WordPress Aiomatic Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13882 \nPublished : March 8, 2025, 9:15 a.m. | 37\u00a0minutes ago \nDescription : The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_generate_featured_image' function in all versions up to, and including, 2.3.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T11:00:23.000000Z"}, {"uuid": "8fe6d617-4a2f-4458-bef7-6d87ac73c8de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13883", "type": "seen", "source": "https://t.me/cvedetector/18623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13883 - WordPress WPUpper Share Buttons CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13883 \nPublished : Feb. 21, 2025, 4:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : The WPUpper Share Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.51. This is due to missing or incorrect nonce validation on the 'save_custom_css_request' function. This makes it possible for unauthenticated attackers to inject custom CSS to modify a site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T07:14:40.000000Z"}, {"uuid": "2f825428-7b3e-42ae-a612-d421f2182529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13888", "type": "seen", "source": "https://t.me/cvedetector/18533", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13888 - WordPress WPMobile.App Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13888 \nPublished : Feb. 20, 2025, 9:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the 'redirect' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T13:09:08.000000Z"}, {"uuid": "0a152af2-4d17-4beb-8fb6-4f0b52a87d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13885", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7594", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13885\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP e-Customers Beta WordPress plugin through 0.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n\ud83d\udccf Published: 2025-03-13T06:00:04.928Z\n\ud83d\udccf Modified: 2025-03-14T16:23:53.184Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/b64d17d6-8416-476e-ad78-b7b9cb85b84f/", "creation_timestamp": "2025-03-14T16:44:13.000000Z"}, {"uuid": "e9bc1016-a50a-4b2f-8a0a-e333447c1b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13884", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7587", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13884\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Limit Bio WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n\ud83d\udccf Published: 2025-03-13T06:00:03.037Z\n\ud83d\udccf Modified: 2025-03-14T16:29:53.044Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/759a60ac-c890-4961-91e4-53db5096eb3c/", "creation_timestamp": "2025-03-14T16:44:04.000000Z"}, {"uuid": "531bb98c-1fa0-4f19-89d4-ae1f8e53e038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13880", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8172", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13880\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The My Quota WordPress plugin through 1.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n\ud83d\udccf Published: 2025-03-20T06:00:07.305Z\n\ud83d\udccf Modified: 2025-03-20T06:00:07.305Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/bee3b002-e808-4402-8bf6-4375ed7b3807/", "creation_timestamp": "2025-03-20T06:18:04.000000Z"}, {"uuid": "b4abe339-937d-4dd1-a1d8-2c688657ac5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13881", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8171", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13881\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Link My Posts WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n\ud83d\udccf Published: 2025-03-20T06:00:07.996Z\n\ud83d\udccf Modified: 2025-03-20T06:00:07.996Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/900fa2c6-0cac-4920-aef2-e8b94248b62e/", "creation_timestamp": "2025-03-20T06:18:03.000000Z"}, {"uuid": "8045f0a9-05e9-4f00-a520-304e703c4ddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13882", "type": "seen", "source": "Telegram/vGynzEJMwZ4cp308WJJDAW1FAJRIy7c8D6GA7rYeN2X5IJ3S", "content": "", "creation_timestamp": "2025-03-08T16:29:01.000000Z"}, {"uuid": "10c02555-0844-4e47-8bc9-17ce54011c83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13880", "type": "seen", "source": "https://t.me/cvedetector/20695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13880 - My Quota WordPress Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-13880 \nPublished : March 20, 2025, 6:15 a.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : The My Quota WordPress plugin through 1.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T09:02:13.000000Z"}, {"uuid": "4e0efb34-a13b-430d-833f-8f3f5f9ef06e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1388", "type": "seen", "source": "https://t.me/ctinow/195180", "content": "https://ift.tt/vUuZqoe\nCVE-2024-1388", "creation_timestamp": "2024-02-28T08:26:54.000000Z"}, {"uuid": "95362615-7a2c-468c-b79c-ea0bc19fef17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1388", "type": "seen", "source": "https://t.me/ctinow/195176", "content": "https://ift.tt/vUuZqoe\nCVE-2024-1388", "creation_timestamp": "2024-02-28T08:26:50.000000Z"}, {"uuid": "6ee3ca99-0eb5-4ad8-b68a-ae8ce34e2b73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lksdom5plf2x", "content": "", "creation_timestamp": "2025-03-20T09:03:28.910896Z"}, {"uuid": "403da0cc-af97-46a3-b206-56908186f982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13881", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lksdomb2ac2m", "content": "", "creation_timestamp": "2025-03-20T09:03:29.480722Z"}, {"uuid": "b0fab196-b816-4985-817e-fabe41b40ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13883", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4851", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13883\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The WPUpper Share Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.51. This is due to missing or incorrect nonce validation on the 'save_custom_css_request' function. This makes it possible for unauthenticated attackers to inject custom CSS to modify a site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-21T03:21:20.350Z\n\ud83d\udccf Modified: 2025-02-21T03:21:20.350Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5ca55c87-6548-43b8-a23f-d31a51df9533?source=cve\n2. https://plugins.trac.wordpress.org/browser/wpupper-share-buttons/trunk/Controller/ajax.controller.php#L94", "creation_timestamp": "2025-02-21T04:19:52.000000Z"}, {"uuid": "f75a5c1a-843d-4a8c-874e-2820d46bc678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13882", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6932", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13882\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_generate_featured_image' function in all versions up to, and including, 2.3.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-03-08T08:22:56.807Z\n\ud83d\udccf Modified: 2025-03-08T08:22:56.807Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7108df0d-771a-4404-b90d-8ac8bc572898?source=cve\n2. https://coderevolution.ro/knowledge-base/faq/full-changelog-aiomatic-automatic-ai-content-writer-editor-gpt-3-gpt-4-chatgpt-chatbot-ai-toolkit/", "creation_timestamp": "2025-03-08T08:37:32.000000Z"}, {"uuid": "324251f2-6d38-448a-908c-1cfa48998818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1388", "type": "seen", "source": "https://t.me/ctinow/208016", "content": "https://ift.tt/3SK1cY5\nCVE-2024-1388 | Yuki Plugin up to 1.3.13 on WordPress Theme Setting authorization (ID 217428)", "creation_timestamp": "2024-03-14T18:26:48.000000Z"}, {"uuid": "86cd3af3-c7cd-4ab6-91d2-53eaf7d20ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13888", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3limctg3wnw26", "content": "", "creation_timestamp": "2025-02-20T12:41:53.818883Z"}, {"uuid": "9968fa6b-effc-4e3d-ac82-ce7a03edd589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13882", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114126651137484458", "content": "", "creation_timestamp": "2025-03-08T11:48:17.079929Z"}, {"uuid": "f7b96a82-a502-402a-801a-dac4a30c7dd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13887", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7394", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13887\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Business Directory Plugin \u2013 Easy Listing Directories for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.14 via the 'ajax_listing_submit_image_upload' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to add arbitrary images to listings.\n\ud83d\udccf Published: 2025-03-13T03:21:01.466Z\n\ud83d\udccf Modified: 2025-03-13T03:21:01.466Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/06c3de6d-92e7-46f8-86a9-37f027767fc0?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3249927/business-directory-plugin/trunk/includes/class-wpbdp.php", "creation_timestamp": "2025-03-13T03:44:01.000000Z"}, {"uuid": "e7f78e3b-be0f-47cb-abdc-ffc2cba630c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13889", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8827", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13889\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WordPress Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.8.3 via deserialization of untrusted input in the 'maybe_unserialize' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.\n\ud83d\udccf Published: 2025-03-26T11:22:09.743Z\n\ud83d\udccf Modified: 2025-03-26T11:22:09.743Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5f0795f7-6eba-4ff0-b0da-5d2b544adf14?source=cve\n2. https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L602\n3. https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L857\n4. https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L891\n5. https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L975\n6. https://plugins.trac.wordpress.org/changeset/3261419/", "creation_timestamp": "2025-03-26T11:25:19.000000Z"}, {"uuid": "d55ee222-b7e7-415d-aa7c-b886f421d6a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13889", "type": "seen", "source": "https://t.me/cvedetector/21170", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13889 - WordPress Importer PHP Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13889 \nPublished : March 26, 2025, 12:15 p.m. | 26\u00a0minutes ago \nDescription : The WordPress Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.8.3 via deserialization of untrusted input in the 'maybe_unserialize' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T13:53:22.000000Z"}, {"uuid": "7cbaf673-ffec-4bdb-b8a6-0ecdb7a39153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13881", "type": "seen", "source": "https://t.me/cvedetector/20696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13881 - Link My Posts WordPress Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13881 \nPublished : March 20, 2025, 6:15 a.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : The Link My Posts WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T09:02:17.000000Z"}, {"uuid": "9c23d527-c067-494a-bb4e-e3c216a42e95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13882", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljujwonqhl2m", "content": "", "creation_timestamp": "2025-03-08T12:35:30.869262Z"}, {"uuid": "a0af71db-7b1d-43be-9f8e-99e471d0be83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13888", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljleer6rfe2z", "content": "", "creation_timestamp": "2025-03-04T21:02:04.249396Z"}]}