{"vulnerability": "CVE-2024-13459", "sightings": [{"uuid": "587fb1e3-84ff-4a76-9047-42e9639a15af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13459", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990264106485566", "content": "", "creation_timestamp": "2025-02-12T09:43:18.601008Z"}, {"uuid": "80da2263-7ef5-493d-a3bc-3b7a8c8d0623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13459", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwx5yyro2s", "content": "", "creation_timestamp": "2025-02-12T10:15:59.056926Z"}, {"uuid": "9b432158-151f-4137-9aa9-0439d85dd8ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13459", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4072", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13459\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:11.440\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://wordpress.org/plugins/fusedesk/\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/a69a99af-3d1d-4ad2-b6b5-e4fcea56be51?source=cve", "creation_timestamp": "2025-02-12T11:11:14.000000Z"}, {"uuid": "3126af50-cc1b-4390-b822-d923cf4e8a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13459", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4099", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13459\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusedesk_newcase' shortcode in all versions up to, and including, 6.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-02-12T12:30:47Z\n\ud83d\udccf Modified: 2025-02-12T12:30:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13459\n2. https://wordpress.org/plugins/fusedesk\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/a69a99af-3d1d-4ad2-b6b5-e4fcea56be51?source=cve", "creation_timestamp": "2025-02-12T13:14:03.000000Z"}, {"uuid": "462c0faa-0d1b-4875-a9cd-9c3c6b672f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13459", "type": "seen", "source": "https://t.me/cvedetector/17841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13459 - WordPress FuseDesk Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13459 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusedesk_newcase' shortcode in all versions up to, and including, 6.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:44.000000Z"}]}