{"vulnerability": "CVE-2024-9860", "sightings": [{"uuid": "8fbcc277-4c22-44a5-b449-a641ecfa5993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9860", "type": "seen", "source": "https://t.me/cvedetector/7757", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9860 - WordPress Bridge Core Cross-Site Scripting (XSS) and Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-9860 \nPublished : Oct. 12, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : The Bridge Core plugin for WordPress is vulnerable to unauthorized modification of data or loss of data due to a missing capability check on the 'import_action' and 'install_plugin_per_demo' functions in versions up to, and including, 3.3. This makes it possible for authenticated attackers with subscriber-level permissions or above, to delete or change plugin settings, import demo data, and install limited plugins. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-12T06:06:58.000000Z"}, {"uuid": "b3e180a2-de1e-475a-a471-460f19261d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9860", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3881", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9860\n\ud83c\udfe2 Vendor: Qode Interactive\n\ud83d\udda5\ufe0f Product: Bridge Core plugin for WordPress\n\ud83d\udd39 Description: The Bridge Core plugin for WordPress is vulnerable to unauthorized modification of data or loss of data due to a missing capability check on the 'import_action' and 'install_plugin_per_demo' functions in versions up to, and including, 3.3. This makes it possible for authenticated attackers with subscriber-level permissions or above, to delete or change plugin settings, import demo data, and install limited plugins.\n\ud83d\udccf Published: 2025-02-05T00:00:00Z\n\ud83d\udd17 References:\n1. https://picussecurity.com/hubfs/red-report-2025/Picus-RedReport-2025.pdf", "creation_timestamp": "2025-02-08T23:20:27.000000Z"}, {"uuid": "d8338bdf-567d-410e-aade-db0a9d87de34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9860", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhjybz2sql2y", "content": "", "creation_timestamp": "2025-02-06T21:02:42.532101Z"}]}