{"vulnerability": "CVE-2024-13850", "sightings": [{"uuid": "6220a83e-8c01-44f1-96a5-515a42be0f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113968257327109943", "content": "", "creation_timestamp": "2025-02-08T12:26:39.205363Z"}, {"uuid": "b16dd79c-993b-4480-b319-39f820487901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lho74czs4a22", "content": "", "creation_timestamp": "2025-02-08T13:15:24.599745Z"}, {"uuid": "8b9c05f0-ea47-4e58-8be7-9b5b3ea7ba6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhoayphci62p", "content": "", "creation_timestamp": "2025-02-08T13:49:10.893440Z"}, {"uuid": "02b57414-2276-4749-8627-0dc676e09358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "seen", "source": "https://t.me/cvedetector/17536", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13850 - \"WordPress Simple Add Pages/Posts Stored XSS Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13850 \nPublished : Feb. 8, 2025, 1:15 p.m. | 48\u00a0minutes ago \nDescription : The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-08T15:44:48.000000Z"}, {"uuid": "d31e21c2-b4e6-482f-8f94-f7a09a715d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3876", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13850\n\ud83d\udd25 CVSS Score: 4.5 (CVSS_V3)\n\ud83d\udd39 Description: The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.\n\ud83d\udccf Published: 2025-02-08T15:30:31Z\n\ud83d\udccf Modified: 2025-02-08T15:30:31Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13850\n2. https://plugins.trac.wordpress.org/browser/simple-add-pages-or-posts/tags/2.0.0/form.php\n3. https://wordpress.org/plugins/simple-add-pages-or-posts/#developers\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/65a3604d-eb6b-484f-834a-b3d75fe3bda7?source=cve", "creation_timestamp": "2025-02-08T16:03:52.000000Z"}, {"uuid": "1f0134b9-736a-4509-809d-a0bab06a084d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13850", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3878", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13850\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-08T13:15:06.840\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/browser/simple-add-pages-or-posts/tags/2.0.0/form.php\n2. https://wordpress.org/plugins/simple-add-pages-or-posts/#developers\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/65a3604d-eb6b-484f-834a-b3d75fe3bda7?source=cve", "creation_timestamp": "2025-02-08T16:03:53.000000Z"}]}