{"vulnerability": "CVE-2024-12213", "sightings": [{"uuid": "dca1476e-1b4c-45aa-a29e-b4e0dd59cc96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990205008091860", "content": "", "creation_timestamp": "2025-02-12T09:28:13.944140Z"}, {"uuid": "20a1c347-1edf-4dec-a537-1e4239f29f90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwwmn3tj2x", "content": "", "creation_timestamp": "2025-02-12T10:15:40.519991Z"}, {"uuid": "8413cfa3-585c-4f38-9b51-65d4663f5b5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113990520210402386", "content": "", "creation_timestamp": "2025-02-12T10:48:23.944571Z"}, {"uuid": "f2e4a00d-bd5f-480d-a960-25183f0ef7a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxzp6sy562h", "content": "", "creation_timestamp": "2025-02-12T11:05:12.398575Z"}, {"uuid": "c2cab996-21b2-4111-9ca8-fd1624fabd8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsuzw7u22", "content": "", "creation_timestamp": "2025-02-13T02:02:04.656797Z"}, {"uuid": "168e7b18-f9e2-4aeb-ab2c-109c5e82d85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoy2dad2s", "content": "", "creation_timestamp": "2025-02-13T15:25:10.892592Z"}, {"uuid": "80d2a0d5-fc39-48c9-8433-10ce1e7233cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4078", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:08.737\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://themeforest.net/item/superio-job-board-wordpress-theme/32180231\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve", "creation_timestamp": "2025-02-12T11:12:39.000000Z"}, {"uuid": "08bc8468-d971-4a3e-88f2-b271ccca5b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4100", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12213\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites.\n\ud83d\udccf Published: 2025-02-12T12:30:46Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12213\n2. https://themeforest.net/item/superio-job-board-wordpress-theme/32180231\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve", "creation_timestamp": "2025-02-12T13:14:07.000000Z"}, {"uuid": "052d2b01-e747-41a5-aded-f840f02b6459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/cvedetector/17849", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12213 - \"WordPress WP Job Board Pro Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12213 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:56.000000Z"}, {"uuid": "47e98ef3-232a-4f64-bf1d-6a172f0e8109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "Telegram/RetDTQe4gf9XidjLfj0lnA2pVG--nwXh-AhkRjnrpVj0ANMA", "content": "", "creation_timestamp": "2025-02-20T23:26:55.000000Z"}, {"uuid": "6ac6f29a-f0aa-42e7-9d28-95197dae5dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "Telegram/ywR1DiyQtSb_DrEJKa7u6yfUtOVJG56e-GjYAA9u-_Wj4NHH", "content": "", "creation_timestamp": "2025-02-14T10:04:58.000000Z"}]}