{"vulnerability": "cve-2024-9636", "sightings": [{"uuid": "4c3e935c-44d8-4d16-8d6b-f2bba331a5f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1719", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9636\n\ud83d\udd39 Description: The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in versions 2.2.85 to 2.3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator.\n\ud83d\udccf Published: 2025-01-15T09:25:53.837Z\n\ud83d\udccf Modified: 2025-01-15T09:25:53.837Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/1bbe01b8-24ed-4e1e-bafc-0f4dea96c1f3?source=cve\n2. https://plugins.trac.wordpress.org/browser/post-grid/tags/2.2.93/includes/blocks/form-wrap/functions.php#L3200\n3. https://plugins.trac.wordpress.org/changeset/3117675/post-grid/trunk/includes/blocks/form-wrap/functions.php\n4. https://plugins.trac.wordpress.org/changeset/3221012/post-grid/trunk/includes/blocks/form-wrap/functions.php", "creation_timestamp": "2025-01-15T10:12:56.000000Z"}, {"uuid": "8aa6ae33-31c2-4e29-9bf5-d3410c6068ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://t.me/cvedetector/15415", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9636 - \"Post Grid and Gutenberg Blocks WordPress Administrator Registration Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-9636 \nPublished : Jan. 15, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in versions 2.2.85 to 2.3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T11:45:46.000000Z"}, {"uuid": "2184ecbe-1506-4779-bfcf-9a43f6e6c9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-9636", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfvwxpig2s2m", "content": "", "creation_timestamp": "2025-01-17T04:20:34.531377Z"}, {"uuid": "278dc10e-9f16-45c6-b5c1-67130b85a22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113831977869007314", "content": "", "creation_timestamp": "2025-01-15T10:48:59.561572Z"}, {"uuid": "5fedcfe3-2b3d-4029-9967-286899a1bf84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfrmbos7nk2q", "content": "", "creation_timestamp": "2025-01-15T10:58:41.344497Z"}, {"uuid": "1f8d76df-d264-46db-bd36-354fbc9bd0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113831720384280701", "content": "", "creation_timestamp": "2025-01-15T09:43:30.741801Z"}, {"uuid": "d3794d95-f419-4a53-bef7-3033ffe52c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfvsrokhot2z", "content": "", "creation_timestamp": "2025-01-17T03:05:37.270008Z"}, {"uuid": "3c25b46c-df91-4de7-902b-9c0c155e09a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfvvz3ucg22w", "content": "", "creation_timestamp": "2025-01-17T04:03:31.519381Z"}, {"uuid": "30083a1c-1113-431c-8f4d-59bfaccf844d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9636", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrjvgklzf2n", "content": "", "creation_timestamp": "2025-01-15T10:16:00.282256Z"}]}