{"vulnerability": "CVE-2024-13821", "sightings": [{"uuid": "1c3574ab-8117-4d9c-83c3-facabf8d52e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "Telegram/SwP5ez4_ew3z3wXd3m5306RpDpEOGeGZ5BDNS1qFUuZ9GcSp", "content": "", "creation_timestamp": "2025-02-14T10:04:03.000000Z"}, {"uuid": "3ecda245-15f4-473c-ad83-990859de9c0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4052", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13821\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: The WP Booking Calendar plugin for WordPress is vulnerable to Unauthenticated Post-Confirmation Booking Manipulation in all versions up to, and including, 10.10. This is due to the plugin not properly requiring re-verification after a booking has been made and a change is being attempted. This makes it possible for unauthenticated attackers to manipulate their confirmed bookings, even after they have been approved.\n\ud83d\udccf Published: 2025-02-12T09:31:44Z\n\ud83d\udccf Modified: 2025-02-12T09:31:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13821\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3234469%40booking&amp;new=3234469%40booking&amp;sfp_email=&amp;sfph_mail=#file20\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/8a0b961e-ccc3-4da0-b007-bbafa133a3a8?source=cve", "creation_timestamp": "2025-02-12T10:09:04.000000Z"}, {"uuid": "f9c53a5f-1d3a-4d2c-8314-f8bc0de7a921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13821\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T08:15:08.660\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3234469%40booking&amp;new=3234469%40booking&amp;sfp_email=&amp;sfph_mail=#file20\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/8a0b961e-ccc3-4da0-b007-bbafa133a3a8?source=cve", "creation_timestamp": "2025-02-12T09:08:24.000000Z"}, {"uuid": "45b0860f-cc89-4352-ba26-42ddd3177672", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "https://t.me/cvedetector/17830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13821 - WordPress WP Booking Calendar Unauthenticated Post-Confirmation Booking Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-13821 \nPublished : Feb. 12, 2025, 8:15 a.m. | 28\u00a0minutes ago \nDescription : The WP Booking Calendar plugin for WordPress is vulnerable to Unauthenticated Post-Confirmation Booking Manipulation in all versions up to, and including, 10.10. This is due to the plugin not properly requiring re-verification after a booking has been made and a change is being attempted. This makes it possible for unauthenticated attackers to manipulate their confirmed bookings, even after they have been approved. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T10:10:58.000000Z"}, {"uuid": "cf697582-58d4-44b0-acd5-479950d52640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113989781136121545", "content": "", "creation_timestamp": "2025-02-12T07:40:26.285063Z"}, {"uuid": "c1623510-ef6b-4dad-bb63-84db39bcd2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxq7tskc22z", "content": "", "creation_timestamp": "2025-02-12T08:15:34.212870Z"}, {"uuid": "1bac9d23-f320-4bb3-9f27-393c69fad7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13821", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhy5mijaxo2t", "content": "", "creation_timestamp": "2025-02-12T12:15:19.238674Z"}]}