{"vulnerability": "CVE-2024-10775", "sightings": [{"uuid": "7392e491-2dbb-47b5-aa23-ef25bb0d41eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfrmbo6czw25", "content": "", "creation_timestamp": "2025-01-15T10:58:39.160237Z"}, {"uuid": "c47bcab8-d4a2-4fc6-8e82-11682275bf32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113831661320283011", "content": "", "creation_timestamp": "2025-01-15T09:28:29.214557Z"}, {"uuid": "d5d52f6c-a0aa-4b72-b709-b83060789124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrjuwmcv52r", "content": "", "creation_timestamp": "2025-01-15T10:15:44.157037Z"}, {"uuid": "4b958c26-b0a3-494d-82fd-b7222b7f1130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1718", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10775\n\ud83d\udd39 Description: The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.4.32 via the 'pafe-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.\n\ud83d\udccf Published: 2025-01-15T09:25:54.399Z\n\ud83d\udccf Modified: 2025-01-15T09:25:54.399Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdbc9bc-70cf-4440-b12d-dd98844d33bc?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3221445%40piotnet-addons-for-elementor&amp;new=3221445%40piotnet-addons-for-elementor&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-15T10:12:30.000000Z"}, {"uuid": "d4b8cb6d-a299-499a-a598-782a5dd623b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://t.me/cvedetector/15416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10775 - Piotnet Addons For Elementor Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10775 \nPublished : Jan. 15, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.4.32 via the 'pafe-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T11:45:47.000000Z"}]}