{"vulnerability": "cve-2024-6220", "sightings": [{"uuid": "672cfb29-0b9d-4577-a4f7-b1d7aabca136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-6220.yaml", "content": "", "creation_timestamp": "2025-12-03T08:31:16.000000Z"}, {"uuid": "d68407d7-c042-4ce2-af48-1d5d26a863c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "exploited", "source": "https://t.me/HackingInsights/8275", "content": "\u200aCritical CVE-2024-6220 Vulnerability in Keydatas WordPress Plugin Actively Exploited\n\nhttps://securityonline.info/critical-cve-2024-6220-vulnerability-in-keydatas-wordpress-plugin-actively-exploited/", "creation_timestamp": "2024-08-01T10:18:47.000000Z"}, {"uuid": "8d4eed4f-7708-4b3c-882a-7e46e0c383cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}, {"uuid": "ada2b0b2-bf6d-4882-9c81-75d0ead557ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m7bf3pbn5o2b", "content": "", "creation_timestamp": "2025-12-05T21:02:29.210234Z"}, {"uuid": "72f91d06-d617-4960-8b94-5867695e4a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "60fd395d-ddb1-4012-af6f-b68cbc6a1406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6220", "type": "seen", "source": "https://t.me/cvedetector/1064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6220 - Keydas Plugin Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6220 \nPublished : July 17, 2024, 8:15 a.m. | 21\u00a0minutes ago \nDescription : The \u7b80\u6570\u91c7\u96c6\u5668 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T10:41:45.000000Z"}]}