{"vulnerability": "CVE-2024-10783", "sightings": [{"uuid": "3694a8ee-6aeb-438d-92c1-80f362f108e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644811939302804", "content": "", "creation_timestamp": "2024-12-13T09:30:14.081481Z"}, {"uuid": "b6cb3d55-7afd-485a-a3eb-523dab41f67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llcon67kys2t", "content": "", "creation_timestamp": "2025-03-26T21:02:12.253640Z"}, {"uuid": "d228c12e-6caf-4632-9aa4-78444ee47f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-10783.yaml", "content": "", "creation_timestamp": "2025-03-24T14:32:29.000000Z"}, {"uuid": "52c78841-1d48-4b2b-8ef2-672882c2fe85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/99", "content": "This vuln is only exp when the plugin has not been connected to a MainWP Dashboard and the (Require unique sec ID) option is not enabled it is disabled by default.", "creation_timestamp": "2025-10-05T22:23:34.000000Z"}, {"uuid": "c66e3c44-a806-4b7e-99d6-ee27bacd9881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/iObTnhRKbaYnOfdcum70MuIyrQNxigsQBPmPgPLvD6uhQUk_FpY", "content": "", "creation_timestamp": "2025-10-06T07:03:23.000000Z"}, {"uuid": "a19c277d-fe2f-4fbc-bb96-e3655e88b057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/i5Zrlju0KAZ8aHUCjq1Q43eeSfN56M-sSk9BtLB59qYPcpxTKw", "content": "", "creation_timestamp": "2025-10-06T07:03:22.000000Z"}, {"uuid": "c740ef2f-7a79-42bb-8450-6cd630459459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/jA_DVqzBvok8aKl8FI4XVxK1MiLBtMNjqSSXDCz-9nD09y8V", "content": "", "creation_timestamp": "2025-10-06T07:03:35.000000Z"}, {"uuid": "612ea3be-20ee-4110-ae42-1a7365ddd58b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://t.me/cvedetector/12854", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10783 - MainWP Child WordPress Unconfigured Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10783 \nPublished : Dec. 13, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The MainWP Child \u2013 Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. This makes it possible for unauthenticated attackers to log in as an administrator on instances where MainWP Child is not yet connected to the MainWP Dashboard. IMPORTANT: this only affects sites who have MainWP Child installed and have not yet connected to the MainWP Dashboard, and do not have the unique security ID feature enabled. Sites already connected to the MainWP Dashboard plugin and do not have the unique security ID feature enabled, are NOT affected and not required to upgrade. Please note 5.2.1 contains a partial patch, though we consider 5.3 to be the complete patch. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T12:25:40.000000Z"}]}