{"uuid": "1def31e2-c22d-4342-a247-20dbd116d851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12571", "type": "seen", "source": "https://t.me/cvedetector/13416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12571 - WordPress LotsOfLocales Google Maps Local File Inclusion\", \n  \"Content\": \"CVE ID : CVE-2024-12571 \nPublished : Dec. 20, 2024, 7:15 a.m. | 43\u00a0minutes ago \nDescription : The Store Locator for WordPress with Google Maps \u2013 LotsOfLocales plugin for WordPress is vulnerable to Local File Inclusion in version 3.98.9 via the 'sl_engine' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T09:13:10.000000Z"}