{"vulnerability": "CVE-2024-1233", "sightings": [{"uuid": "2571b0b6-a704-4e4c-b469-b0afa8b091be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12338", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637984674758678", "content": "", "creation_timestamp": "2024-12-12T04:33:59.728233Z"}, {"uuid": "a26b0cf1-2c80-433b-a886-a3374c923f64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12333", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113638930528958493", "content": "", "creation_timestamp": "2024-12-12T08:34:31.738884Z"}, {"uuid": "efd34792-b133-4890-a4d3-7b0439effa8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12331", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679215508789554", "content": "", "creation_timestamp": "2024-12-19T11:19:30.742152Z"}, {"uuid": "c1553ed5-82b6-45bd-a40b-2091909e0a0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12331", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldntys2f3a2z", "content": "", "creation_timestamp": "2024-12-19T12:15:48.322348Z"}, {"uuid": "d14da0d3-d248-491a-b8b0-194de29e14c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12337", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113792436170808261", "content": "", "creation_timestamp": "2025-01-08T11:13:01.144038Z"}, {"uuid": "6f46f424-ea9e-43fa-92ee-d13db403537e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12337", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7zxsnpbw2a", "content": "", "creation_timestamp": "2025-01-08T11:15:44.438765Z"}, {"uuid": "e3f59900-ba2f-4d5a-a373-574f25b8d0e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12337", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfa43vg36z2b", "content": "", "creation_timestamp": "2025-01-08T11:53:50.071581Z"}, {"uuid": "c6110232-a94e-4cfb-9023-ea4b3a0d3894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12332", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4vhs53rs2c", "content": "", "creation_timestamp": "2025-01-07T05:17:12.934943Z"}, {"uuid": "f174bc08-d6ef-4660-aa07-4be5172306ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12335", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113712111301836978", "content": "", "creation_timestamp": "2024-12-25T06:45:20.838985Z"}, {"uuid": "1b0783fb-c344-47b9-8e49-0438f5df8e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12335", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le4fznovsq2c", "content": "", "creation_timestamp": "2024-12-25T07:15:41.057623Z"}, {"uuid": "0b92e618-1183-48a6-a325-d934962faf14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12330", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckh543os2i", "content": "", "creation_timestamp": "2025-01-09T11:15:58.286267Z"}, {"uuid": "180d3599-f660-49e3-9831-7fd301daae35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12330", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798282251844866", "content": "", "creation_timestamp": "2025-01-09T11:59:45.410894Z"}, {"uuid": "4dc17d9d-6a97-4bfe-9b71-b42e3042aaaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113894370018911502", "content": "", "creation_timestamp": "2025-01-26T11:16:08.332457Z"}, {"uuid": "43cb2a5c-69ff-424c-bbe7-64bdb844e159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgnfpysgc72f", "content": "", "creation_timestamp": "2025-01-26T12:15:55.780223Z"}, {"uuid": "221d6437-fca8-4c49-b794-4f27168abb1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgno3r4mqo2e", "content": "", "creation_timestamp": "2025-01-26T14:45:40.321055Z"}, {"uuid": "87458794-40f1-4e90-912a-c8ca3e4a21ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12336", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkfdkxcbgl2k", "content": "", "creation_timestamp": "2025-03-15T04:56:47.744092Z"}, {"uuid": "5d344874-8ac6-4af6-8e66-47cc3c99eb65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12332", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/312", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12332\n\ud83d\udd39 Description: The School Management System \u2013 WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Student/Parent-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-07T04:22:18.694Z\n\ud83d\udccf Modified: 2025-01-07T04:22:18.694Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c0248af2-f9f3-4652-bf6d-b46aa91b66f3?source=cve\n2. https://plugins.trac.wordpress.org/browser/wpschoolpress/trunk/pages/wpsp-teacher.php#L72\n3. https://plugins.trac.wordpress.org/browser/wpschoolpress/trunk/pages/wpsp-teacher.php#L73\n4. https://plugins.trac.wordpress.org/browser/wpschoolpress/trunk/pages/wpsp-teacher.php#L49", "creation_timestamp": "2025-01-07T04:37:38.000000Z"}, {"uuid": "6ac3a386-25f6-45e0-ac42-a8f2b41edfdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12339", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4790", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12339\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Digihood HTML Sitemap plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018channel' parameter in all versions up to, and including, 3.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-19T07:32:10.616Z\n\ud83d\udccf Modified: 2025-02-19T07:32:10.616Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/862f8743-5c8c-45ee-a2eb-9ae12c2800ca?source=cve\n2. https://plugins.trac.wordpress.org/browser/wedesin-html-sitemap/trunk/plugin-framework/Functions/Logging/html.php#L36\n3. https://plugins.trac.wordpress.org/browser/wedesin-html-sitemap/trunk/plugin-framework/Functions/Logging/html.php#L64", "creation_timestamp": "2025-02-19T08:41:10.000000Z"}, {"uuid": "6c38594d-a7c5-44b0-93b8-707f904b3dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12339", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lijdigmvma2o", "content": "", "creation_timestamp": "2025-02-19T08:15:39.117456Z"}, {"uuid": "c3142b10-29dc-404b-8491-80a519ba8ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12337", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12337\n\ud83d\udd39 Description: The Shipping via Planzer for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018processed-ids\u2019 parameter in all versions up to, and including, 1.0.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-08T11:09:25.845Z\n\ud83d\udccf Modified: 2025-01-08T11:09:25.845Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/e80ed130-8ad2-4fb0-a583-02fc675804d6?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3214785/wc-planzer-shipping", "creation_timestamp": "2025-01-08T12:12:40.000000Z"}, {"uuid": "adf5d19f-99ba-4e17-b321-c6f2c0e7dc6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12330", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/949", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12330\n\ud83d\udd39 Description: The WP Database Backup \u2013 Unlimited Database &amp; Files Backup by Backup for WP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.3 via publicly accessible back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including all information stored in the database.\n\ud83d\udccf Published: 2025-01-09T11:10:56.083Z\n\ud83d\udccf Modified: 2025-01-09T11:10:56.083Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/3f36839b-850e-4c39-aa61-4fd7a89cd5bc?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3209380%40wp-database-backup&amp;new=3209380%40wp-database-backup&amp;sfp_email=&amp;sfph_mail=\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3209387%40wp-database-backup&amp;new=3209387%40wp-database-backup&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-09T12:16:47.000000Z"}, {"uuid": "0bb6fd74-dded-4a16-a59a-44d0ac70b504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3135", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12334\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-26T12:15:28.460\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset/3224312/wc-affiliate\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/efca1ee2-2038-440e-941c-22533b4d833b?source=cve", "creation_timestamp": "2025-01-26T13:14:25.000000Z"}, {"uuid": "f966f00a-e81b-4760-aefc-3bd18542035f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12332", "type": "seen", "source": "https://t.me/cvedetector/14454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12332 - WordPress WPSchoolPress SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12332 \nPublished : Jan. 7, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : The School Management System \u2013 WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Student/Parent-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T07:10:12.000000Z"}, {"uuid": "05e59356-7551-49d2-b4b9-0202ff233390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3131", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-x7qc-wx3v-p86v\n\ud83d\udd25 CVSS Score: N/A (CVSS_V3)\n\ud83d\udd39 Description: The WC Affiliate \u2013 A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via any parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-26T12:30:31Z\n\ud83d\udccf Modified: 2025-01-26T12:30:31Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12334\n2. https://plugins.trac.wordpress.org/changeset/3224312/wc-affiliate\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/efca1ee2-2038-440e-941c-22533b4d833b?source=cve", "creation_timestamp": "2025-01-26T13:06:16.000000Z"}, {"uuid": "007fdb70-634b-4cbf-98e2-147aab9f4ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12334", "type": "seen", "source": "https://t.me/cvedetector/16415", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12334 - Adobe WC Affiliate Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12334 \nPublished : Jan. 26, 2025, 12:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : The WC Affiliate \u2013 A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via any parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-26T15:44:38.000000Z"}, {"uuid": "3c5820c3-b164-45fc-bfe7-0a7695590a63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12336", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12336\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The WC Affiliate \u2013 A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'export_all_data' function in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive affiliate data, including personally identifiable information (PII).\n\ud83d\udccf Published: 2025-03-15T03:23:24.688Z\n\ud83d\udccf Modified: 2025-03-15T03:23:24.688Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0fb349-4cb8-4cf3-ae7c-5c4dcc6fd4f7?source=cve\n2. https://plugins.trac.wordpress.org/browser/wc-affiliate/trunk/src/AJAX.php#L903", "creation_timestamp": "2025-03-15T03:48:59.000000Z"}, {"uuid": "9d462110-3d1f-4f4e-9aa0-32a6af9d60ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12336", "type": "seen", "source": "https://t.me/cvedetector/20359", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12336 - WordPress WC Affiliate - Unauthenticated Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12336 \nPublished : March 15, 2025, 4:15 a.m. | 1\u00a0hour, 35\u00a0minutes ago \nDescription : The WC Affiliate \u2013 A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'export_all_data' function in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive affiliate data, including personally identifiable information (PII). \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-15T06:55:50.000000Z"}, {"uuid": "640240b4-d64e-4fe4-9926-19a964d1e0ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12330", "type": "seen", "source": "https://t.me/cvedetector/14842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12330 - Backup for WP WordPress Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12330 \nPublished : Jan. 9, 2025, 11:15 a.m. | 22\u00a0minutes ago \nDescription : The WP Database Backup \u2013 Unlimited Database &amp; Files Backup by Backup for WP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.3 via publicly accessible back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including all information stored in the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T12:44:56.000000Z"}, {"uuid": "86054f48-b412-4d66-9c1d-10fece7aac25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12337", "type": "seen", "source": "https://t.me/cvedetector/14685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12337 - Planzer Shipping via WooCommerce Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12337 \nPublished : Jan. 8, 2025, 11:15 a.m. | 42\u00a0minutes ago \nDescription : The Shipping via Planzer for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018processed-ids\u2019 parameter in all versions up to, and including, 1.0.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T13:18:12.000000Z"}, {"uuid": "388ef3d2-aaa2-4fcd-a5a8-7b1086137857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12335", "type": "seen", "source": "https://t.me/cvedetector/13621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12335 - Avada Fusion Builder WordPress Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12335 \nPublished : Dec. 25, 2024, 7:15 a.m. | 30\u00a0minutes ago \nDescription : The Avada (Fusion) Builder plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.11.12 via the handle_clone_post() function and the 'fusion_blog' shortcode and due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T08:47:50.000000Z"}, {"uuid": "b8ab55a9-2e7a-45ca-88c0-b1f019527f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12331", "type": "seen", "source": "https://t.me/cvedetector/13325", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12331 - Filester File Manager Pro \u2013 WordPress Unauthenticated Plugin Installation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12331 \nPublished : Dec. 19, 2024, 12:15 p.m. | 42\u00a0minutes ago \nDescription : The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T13:59:01.000000Z"}, {"uuid": "e7916c36-a2df-44f6-ad45-6b55d05583ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12333", "type": "seen", "source": "https://t.me/cvedetector/12758", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12333 - Woodmart WordPress Shortcode Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12333 \nPublished : Dec. 12, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_instagram_ajax_query AJAX action. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T11:19:24.000000Z"}, {"uuid": "b0b6309d-7c82-445d-9a44-c3cd94fb9ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12338", "type": "seen", "source": "https://t.me/cvedetector/12690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12338 - \"WordPress Website Toolbox Community Plugin Reflected Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12338 \nPublished : Dec. 12, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Website Toolbox Community plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018websitetoolbox_username\u2019 parameter in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T06:17:24.000000Z"}, {"uuid": "06470955-973c-4a36-9ed1-e04c654a70c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12339", "type": "seen", "source": "Telegram/qzFyNsNY2SbItVHGLPR9f8mPeURLdPPsne6tN29f9_YE3nc4", "content": "", "creation_timestamp": "2025-02-19T15:39:51.000000Z"}]}