{"vulnerability": "CVE-2024-10567", "sightings": [{"uuid": "5a9806d1-39d6-4df5-a735-56c2bc89e90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10567", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113593635849560507", "content": "", "creation_timestamp": "2024-12-04T08:35:28.804513Z"}, {"uuid": "ba6aabeb-d22f-4922-9f60-59f6781b497e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10567", "type": "seen", "source": "https://t.me/cvedetector/11962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10567 - TI WooCommerce Wishlist Unauthorized Data Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10567 \nPublished : Dec. 4, 2024, 9:15 a.m. | 37\u00a0minutes ago \nDescription : The TI WooCommerce Wishlist plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wizard' function in all versions up to, and including, 2.9.1. This makes it possible for unauthenticated attackers to create new pages, modify plugin settings, and perform limited options updates. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T10:53:57.000000Z"}]}