{"vulnerability": "CVE-2024-13365", "sightings": [{"uuid": "beb78073-7486-49fa-b5b0-70def1387cfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990205039131652", "content": "", "creation_timestamp": "2025-02-12T09:28:15.439426Z"}, {"uuid": "116befea-d18d-42d7-abef-67adfde954d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwws3sme2p", "content": "", "creation_timestamp": "2025-02-12T10:15:46.140204Z"}, {"uuid": "3db9c558-c8fe-4e98-912d-58b4e4575dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113990520291059526", "content": "", "creation_timestamp": "2025-02-12T10:48:24.815636Z"}, {"uuid": "c929dc83-3823-4f21-bdee-d9a138ca5fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxzp7y3rw23", "content": "", "creation_timestamp": "2025-02-12T11:05:13.951454Z"}, {"uuid": "fee41fbe-adfd-4156-ba34-dcc419fe31d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/digitaldotsl.bsky.social/post/3li2hstswsk2g", "content": "", "creation_timestamp": "2025-02-13T10:23:07.336826Z"}, {"uuid": "d539e114-be9b-4569-b706-4fc69fda4c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoyg6yg2a", "content": "", "creation_timestamp": "2025-02-13T15:25:11.640981Z"}, {"uuid": "6794090d-2a4f-4bbc-b9f0-24b485c6457e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoys2zr2t", "content": "", "creation_timestamp": "2025-02-13T15:25:12.476562Z"}, {"uuid": "0c0e3c6d-bb19-4abc-9ad0-906679d47520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsvnmzm2a", "content": "", "creation_timestamp": "2025-02-13T02:02:05.750124Z"}, {"uuid": "321fe247-8756-4e4e-b844-f59415b3319e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsx6vbt2o", "content": "", "creation_timestamp": "2025-02-13T02:02:07.465142Z"}, {"uuid": "ae9e5855-549e-4089-a5bc-8d4ea3e66477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3li46yrgtds2y", "content": "", "creation_timestamp": "2025-02-14T02:50:46.482226Z"}, {"uuid": "542619b3-6d49-4daf-ace1-3b8d414b284d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "70ce032f-3459-4927-bc04-ae51532df9c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4076", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13365\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:10.547\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset/3229205/security-malware-firewall#file527\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa30fa2-6c42-4e5f-a0b5-8711ce5d8121?source=cve", "creation_timestamp": "2025-02-12T11:12:34.000000Z"}, {"uuid": "aaa3d7c9-1ba5-41cb-a4e2-ce2066b4683b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4101", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13365\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: The Security &amp; Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function  in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-02-12T12:30:46Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13365\n2. https://plugins.trac.wordpress.org/changeset/3229205/security-malware-firewall#file527\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa30fa2-6c42-4e5f-a0b5-8711ce5d8121?source=cve", "creation_timestamp": "2025-02-12T13:14:10.000000Z"}, {"uuid": "62182069-826d-402c-b411-da299b2d3d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/cvedetector/17845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13365 - \"CleanTalk Plugin for WordPress Arbitrary File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13365 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The Security &amp; Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function  in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:50.000000Z"}, {"uuid": "3eab6eae-f66c-45a5-8e40-b243aef6ce94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/CyberBulletin/2326", "content": "\u26a1Hackers Can Take Over 30,000 WordPress Sites Due to Critical CleanTalk Security Flaw (CVE-2024-13365).\n\n#CyberBulletin", "creation_timestamp": "2025-02-14T15:20:22.000000Z"}]}