{"vulnerability": "CVE-2024-12315", "sightings": [{"uuid": "c095c7b9-c6db-493f-bcc4-093e18c63fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12315\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: The Export All Posts, Products, Orders, Refunds &amp; Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data.\n\ud83d\udccf Published: 2025-02-12T09:31:45Z\n\ud83d\udccf Modified: 2025-02-12T09:31:45Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12315\n2. https://plugins.trac.wordpress.org/browser/wp-ultimate-exporter/trunk/exportExtensions/ExportExtension.php#L1678\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3230400%40wp-ultimate-exporter&amp;new=3230400%40wp-ultimate-exporter&amp;sfp_email=&amp;sfph_mail=\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/075709e0-5f00-4d7b-80f6-96e3b4b4a895?source=cve", "creation_timestamp": "2025-02-12T10:08:40.000000Z"}, {"uuid": "34a3c789-12ec-4164-bd1b-ff6012a27cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwlekul2i2x", "content": "", "creation_timestamp": "2025-02-11T21:16:04.051830Z"}, {"uuid": "b59c45a3-1328-4441-be6f-8bbe7ee03d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwvvoqnep2u", "content": "", "creation_timestamp": "2025-02-12T00:24:35.895042Z"}, {"uuid": "66501aee-44fc-4920-bb1d-fb5687918f46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113989978657694600", "content": "", "creation_timestamp": "2025-02-12T08:30:40.140296Z"}, {"uuid": "cd2cfd5d-6e36-4bdb-851b-926b6e07dc39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxtljp3a62s", "content": "", "creation_timestamp": "2025-02-12T09:15:47.450459Z"}, {"uuid": "26d87a18-dc41-41e7-8362-0c7ddfa64013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhy5miaorn2v", "content": "", "creation_timestamp": "2025-02-12T12:15:17.777181Z"}, {"uuid": "dcc8d827-ff3d-465b-b3bd-fbbf49487fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "https://t.me/cvedetector/17850", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12315 - WordPress Export All Posts, Products, Orders, Refunds &amp; Users Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12315 \nPublished : Feb. 12, 2025, 9:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : The Export All Posts, Products, Orders, Refunds &amp; Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:57.000000Z"}, {"uuid": "a3dc4443-d351-4fbc-b1f4-fbf23a6bd00d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12315", "type": "seen", "source": "Telegram/cNHz2WIqvypLYxSi6vlQDxxMDAeiIhgPdHWn4S5Rx9t0uge9", "content": "", "creation_timestamp": "2025-02-14T10:04:03.000000Z"}]}