{"vulnerability": "CVE-2024-12033", "sightings": [{"uuid": "aab473e8-1f23-4882-a236-c1b6c4848545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12033", "type": "seen", "source": "https://bsky.app/profile/wiretor.bsky.social/post/3lf5v4w46qk2g", "content": "", "creation_timestamp": "2025-01-07T14:43:53.314746Z"}, {"uuid": "0186f1de-2929-4b49-be5c-e8b9d8e40988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12033", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5muickv22i", "content": "", "creation_timestamp": "2025-01-07T12:15:55.247777Z"}, {"uuid": "d0bf88d2-3464-4749-b8f0-55fd02cb35d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12033", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5oxpxotc2k", "content": "", "creation_timestamp": "2025-01-07T12:53:30.966649Z"}, {"uuid": "0d5fff2e-cf2e-410f-865d-b2c39d172bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12033", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/393", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12033\n\ud83d\udd39 Description: The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the sync_libraries() function in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to sync libraries\n\ud83d\udccf Published: 2025-01-07T11:11:11.179Z\n\ud83d\udccf Modified: 2025-01-07T11:11:11.179Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7e452aa0-bfb9-4805-b2ed-53464a4b5308?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3214798/jupiterx-core/trunk/includes/extensions/raven/includes/plugin.php", "creation_timestamp": "2025-01-07T11:37:23.000000Z"}, {"uuid": "b20592d0-e939-4cf7-921f-8160aadab924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12033", "type": "seen", "source": "https://t.me/cvedetector/14537", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12033 - Jupiter X Core WordPress Unauthenticated Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-12033 \nPublished : Jan. 7, 2025, 12:15 p.m. | 29\u00a0minutes ago \nDescription : The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the sync_libraries() function in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to sync libraries \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T13:52:40.000000Z"}]}