{"vulnerability": "cve-2024-9265", "sightings": [{"uuid": "29274eec-f851-4497-81ce-ab4a84368a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9265\n\ud83c\udfe2 Vendor: coderevolution\n\ud83d\udda5\ufe0f Product: echo_rss_feed_post_generator\n\ud83d\udd39 Description: The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.\n\ud83d\udccf Published: 2024-10-01T00:00:00Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/rss-feed-post-generator-echo/wordpress-echo-rss-feed-post-generator-plugin-5-4-6-unauthenticated-privilege-escalation-vulnerability", "creation_timestamp": "2025-02-08T23:20:33.000000Z"}, {"uuid": "442bac96-b957-47c1-8796-4f4c0b1681b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/cvedetector/6727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9265 - WordPress Echo RSS Feed Post Generator Plugin Admin Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-9265 \nPublished : Oct. 1, 2024, 9:15 a.m. | 34\u00a0minutes ago \nDescription : The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T11:54:18.000000Z"}]}