{"vulnerability": "CVE-2024-12535", "sightings": [{"uuid": "d690e9b9-e3d7-46e1-a240-961029773172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785617281381888", "content": "", "creation_timestamp": "2025-01-07T06:18:53.560667Z"}, {"uuid": "53810789-dda5-4ee4-94dd-d5deede4342b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf4zpopd7k2g", "content": "", "creation_timestamp": "2025-01-07T06:33:19.542241Z"}, {"uuid": "c4b48393-f945-442f-9ec2-6b6eac372c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113785733275961310", "content": "", "creation_timestamp": "2025-01-07T06:48:23.180514Z"}, {"uuid": "389acd4f-74e3-4347-9451-ae4fbf240e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad5yyeg2t", "content": "", "creation_timestamp": "2025-01-20T21:02:06.581166Z"}, {"uuid": "31de0e08-3374-47bb-9bca-0757a89e0bf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4yrl6ygx2i", "content": "", "creation_timestamp": "2025-01-07T06:16:22.390262Z"}, {"uuid": "5e6931b8-3ef6-477c-86a2-5d8297e105cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12535\n\ud83d\udd39 Description: The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.\n\ud83d\udccf Published: 2025-01-07T05:23:55.768Z\n\ud83d\udccf Modified: 2025-01-07T05:23:55.768Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/88d27385-9b92-419c-9e03-687d7192bbb5?source=cve\n2. https://plugins.trac.wordpress.org/browser/host-php-info/trunk/info.php#L2", "creation_timestamp": "2025-01-07T05:38:26.000000Z"}, {"uuid": "1ef6c2bf-1390-44c4-9798-0b3133a148bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12535", "type": "seen", "source": "https://t.me/cvedetector/14470", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12535 - \"WordPress Host PHP Info Plugin Unauthenticated Arbitrary Configuration Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-12535 \nPublished : Jan. 7, 2025, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T08:00:35.000000Z"}]}