{"vulnerability": "cve-2024-7493", "sightings": [{"uuid": "c96e2248-e548-4b68-b56c-cc233046589b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7493", "type": "seen", "source": "https://t.me/cvedetector/4972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7493 - WordPress WPCOM Member Privilege Escalation Arbitrary User Role Update\", \n  \"Content\": \"CVE ID : CVE-2024-7493 \nPublished : Sept. 6, 2024, 2:15 p.m. | 45\u00a0minutes ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T17:26:24.000000Z"}]}