{"vulnerability": "CVE-2024-13457", "sightings": [{"uuid": "75b8ec6d-8310-453c-b0f9-02db7387b691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13457", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113915968954823693", "content": "", "creation_timestamp": "2025-01-30T06:49:02.658420Z"}, {"uuid": "df67d353-dc05-42e5-baa1-4b809027d764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13457", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgwwsj5phs2e", "content": "", "creation_timestamp": "2025-01-30T07:15:31.330979Z"}, {"uuid": "b7767b7d-0910-427d-802d-85ef446a19d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13457", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}, {"uuid": "87904cb6-83b9-4804-a560-46a304867bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13457", "type": "seen", "source": "https://t.me/cvedetector/16747", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13457 - WordPress Event Tickets and Registration Insecure Direct Object Reference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13457 \nPublished : Jan. 30, 2025, 7:15 a.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T10:05:00.000000Z"}, {"uuid": "02452bba-b543-4cac-9253-eea563f3547e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13457", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13457\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date.\n\ud83d\udccf Published: 2025-01-30T09:30:36Z\n\ud83d\udccf Modified: 2025-01-30T09:30:36Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13457\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;new=3229935%40event-tickets%2Ftags%2F5.18.1.1&amp;old=3227011%40event-tickets%2Ftags%2F5.18.1\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/0cc2261a-889e-40ec-8382-48de65b91b34?source=cve", "creation_timestamp": "2025-01-30T10:11:43.000000Z"}]}