{"vulnerability": "CVE-2023-2866", "sightings": [{"uuid": "1f4132b8-cfa9-4dac-8f28-71bd2ff3642c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28663", "type": "seen", "source": "https://t.me/cibsecurity/60533", "content": "\u203c CVE-2023-28663 \u203c\n\nThe Formidable PRO2PDF WordPress Plugin, version &lt; 3.11, is affected by an authenticated SQL injection vulnerability in the \u00e2\u20ac\u02dcfieldmap\u00e2\u20ac\u2122 parameter in the fpropdf_export_file action.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:23.000000Z"}, {"uuid": "e67154f0-2f68-4b8e-a05c-c6492e7f2b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28660", "type": "seen", "source": "https://t.me/cibsecurity/60517", "content": "\u203c CVE-2023-28660 \u203c\n\nThe Events Made Easy WordPress Plugin, version &lt;= 2.3.14 is affected by an authenticated SQL injection vulnerability in the 'search_name' parameter in the eme_recurrences_list action.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:35:59.000000Z"}, {"uuid": "ca7aef56-84ab-4fd2-973d-66ce4c7efea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28667", "type": "seen", "source": "https://t.me/cibsecurity/60529", "content": "\u203c CVE-2023-28667 \u203c\n\nThe Lead Generated WordPress Plugin, version &lt;= 1.23, was affected by an unauthenticated insecure deserialization issue. The tve_labels parameter of the tve_api_form_submit action is passed to the PHP unserialize() function without being sanitized or verified, and as a result could lead to PHP object injection, which when combined with certain class implementations / gadget chains could be leveraged to perform a variety of malicious actions granted a POP chain is also present.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:16.000000Z"}, {"uuid": "a6dbff0f-d331-49d8-b8ba-7dedff532d4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28661", "type": "seen", "source": "https://t.me/cibsecurity/60528", "content": "\u203c CVE-2023-28661 \u203c\n\nThe WP Popup Banners WordPress Plugin, version &lt;= 1.2.5, is affected by an authenticated SQL injection vulnerability in the 'value' parameter in the get_popup_data action.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:15.000000Z"}, {"uuid": "a0ae4759-2d65-4ac6-9f36-aa9ef4520ff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28662", "type": "seen", "source": "https://t.me/cibsecurity/60527", "content": "\u203c CVE-2023-28662 \u203c\n\nThe Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version &lt;= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:14.000000Z"}, {"uuid": "94994643-1aaf-44a4-b88a-42e04a0e98c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28664", "type": "seen", "source": "https://t.me/cibsecurity/60524", "content": "\u203c CVE-2023-28664 \u203c\n\nThe Meta Data and Taxonomies Filter WordPress plugin, in versions &lt; 1.3.1, is affected by a reflected cross-site scripting vulnerability in the 'tax_name' parameter of the mdf_get_tax_options_in_widget action, which can only be triggered by an authenticated user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:08.000000Z"}, {"uuid": "85ca1df9-715c-4aff-b339-55c419f9855a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28666", "type": "seen", "source": "https://t.me/cibsecurity/60520", "content": "\u203c CVE-2023-28666 \u203c\n\nThe InPost Gallery WordPress plugin, in versions &lt; 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action, which can only be triggered by an authenticated user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:04.000000Z"}, {"uuid": "191ce2a5-c544-4d72-8c79-8034dce54d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28665", "type": "seen", "source": "https://t.me/cibsecurity/60518", "content": "\u203c CVE-2023-28665 \u203c\n\nThe Woo Bulk Price Update WordPress plugin, in versions &lt; 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'page' parameter to the techno_get_products action, which can only be triggered by an authenticated user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:00.000000Z"}]}