{"vulnerability": "cve-2024-13924", "sightings": [{"uuid": "74b04e5d-4a35-4a9e-ab8b-e8adcb96829a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13924", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114127947868522711", "content": "", "creation_timestamp": "2025-03-08T17:18:03.038559Z"}, {"uuid": "371491dc-9087-4b74-a8f2-fe55b4620e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13924", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6945", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13924\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: The Starter Templates by FancyWP plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.0.0 via the 'http_request_host_is_external' filter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n\ud83d\udccf Published: 2025-03-08T12:21:32.041Z\n\ud83d\udccf Modified: 2025-03-08T12:21:32.041Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/9355b100-08a9-4640-a91b-e56ba1ab9b07?source=cve\n2. https://plugins.trac.wordpress.org/browser/starter-templates/trunk/classess/class-export.php#L3", "creation_timestamp": "2025-03-08T12:36:26.000000Z"}, {"uuid": "9c050e2c-8760-4226-ac30-8621afd06aa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13924", "type": "seen", "source": "Telegram/HG0M_GwIqq-n4i0Gf-FzKxnP20cW5N5XUKms6jqt4dgi5pDp", "content": "", "creation_timestamp": "2025-03-08T16:29:02.000000Z"}, {"uuid": "5745ad80-1810-421d-8766-9d3902386797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13924", "type": "seen", "source": "https://t.me/cvedetector/19899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13924 - FancyWP WordPress Blind Server-Side Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13924 \nPublished : March 8, 2025, 1:15 p.m. | 44\u00a0minutes ago \nDescription : The Starter Templates by FancyWP plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.0.0 via the 'http_request_host_is_external' filter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T15:11:16.000000Z"}]}