Skip to content

Commit

Permalink
generated content from 2025-02-19
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 19, 2025
1 parent 9743307 commit 1594881
Show file tree
Hide file tree
Showing 166 changed files with 3,795 additions and 0 deletions.
165 changes: 165 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -267614,3 +267614,168 @@ vulnerability,CVE-2025-23840,vulnerability--0fcb5aec-2ece-44e2-95bc-9cb116f406e4
vulnerability,CVE-2025-0714,vulnerability--e8719f29-f4e5-4070-9740-90282503b90a
vulnerability,CVE-2025-0001,vulnerability--11cb19de-4be8-4761-88ab-9b7fb4e218c3
vulnerability,CVE-2025-0924,vulnerability--bd9b2be3-7701-435f-837c-81d404991976
vulnerability,CVE-2022-41545,vulnerability--2bda377c-fa9a-4098-9d6d-452c310e6481
vulnerability,CVE-2024-4028,vulnerability--87ca6ad5-4895-4ef4-ba0b-9baeb7b386c0
vulnerability,CVE-2024-50609,vulnerability--e3fb8bbf-c054-4016-84b8-af0144380d14
vulnerability,CVE-2024-50608,vulnerability--17b8651d-11ef-47ad-9f58-dc0576e9684d
vulnerability,CVE-2024-51505,vulnerability--785f6624-ba0d-42f7-9aeb-09519264544c
vulnerability,CVE-2024-57046,vulnerability--e2afdc25-a6d2-44a5-beed-a8770760a0f5
vulnerability,CVE-2024-57258,vulnerability--80eb91d0-13dc-48b9-9d29-4b41f7c61b7f
vulnerability,CVE-2024-57254,vulnerability--f2b7e9c9-767b-422c-beb1-1e6a10e15677
vulnerability,CVE-2024-57255,vulnerability--f6f00a7d-452f-499f-af51-f410ca5fc531
vulnerability,CVE-2024-57259,vulnerability--bd967586-af5c-4e96-8d6f-137cc287c403
vulnerability,CVE-2024-57056,vulnerability--cdbf0217-58d8-406e-bb40-b06a65c31536
vulnerability,CVE-2024-57963,vulnerability--2b779d52-2d42-43ca-8704-37cc5b814ace
vulnerability,CVE-2024-57045,vulnerability--6e189608-02be-43f2-b4d6-c6b36663f9ff
vulnerability,CVE-2024-57964,vulnerability--516dac36-06a3-4d0e-bec5-d6d6b84490be
vulnerability,CVE-2024-57256,vulnerability--df19a4e7-5162-4575-afbb-abc68f3addbd
vulnerability,CVE-2024-57257,vulnerability--aac6cef1-62d6-4a45-8920-0bbd4798d7e2
vulnerability,CVE-2024-57050,vulnerability--cadbf49d-10d9-4bf3-aeca-1acd1444fa2a
vulnerability,CVE-2024-57049,vulnerability--0b2f9aa7-6c55-46c3-8442-bee2bd86b9c5
vulnerability,CVE-2024-57055,vulnerability--f012b191-d711-4e7e-84d9-746df4a50ed4
vulnerability,CVE-2024-12860,vulnerability--1edb14c8-f579-478d-b81a-da6eb1b319fe
vulnerability,CVE-2024-12314,vulnerability--e157bac2-4f0d-4c16-b62a-ee24f38324aa
vulnerability,CVE-2024-12525,vulnerability--efca0e44-6db3-4455-8a1f-81f53582e042
vulnerability,CVE-2024-12813,vulnerability--f7f3358f-439f-453d-a375-4f7503ef1b03
vulnerability,CVE-2024-45776,vulnerability--df3f6458-a8b3-4a7a-9e35-4725798c8dc7
vulnerability,CVE-2024-45320,vulnerability--a3fd4a7a-4916-4f53-b1f3-4cb018b3c12e
vulnerability,CVE-2024-45783,vulnerability--122385ff-5442-4118-9fd2-f7c4b74dcd66
vulnerability,CVE-2024-45775,vulnerability--7481ba4f-3d96-4fad-9fbd-695525cd4b13
vulnerability,CVE-2024-45774,vulnerability--65da8828-80bb-4f22-a37b-787548bbea19
vulnerability,CVE-2024-45781,vulnerability--ba3883b3-4cd7-4285-b00b-ba83f752e015
vulnerability,CVE-2024-39328,vulnerability--46f658d9-4299-4567-a98d-46c0d3e0e33e
vulnerability,CVE-2024-39327,vulnerability--a50c05b4-455f-4639-b09b-8ede3dfdb734
vulnerability,CVE-2024-49589,vulnerability--8fa9b232-c277-4e12-9603-4cfcf7818aef
vulnerability,CVE-2024-55460,vulnerability--5622f8d5-87ec-465d-b2a9-0720c63942f7
vulnerability,CVE-2024-13578,vulnerability--ede41676-0988-4fba-9128-a7804d1df9e5
vulnerability,CVE-2024-13395,vulnerability--a86421d0-2a3c-4859-94a4-78a1e96929b6
vulnerability,CVE-2024-13523,vulnerability--e5145ed9-ab94-4de8-8ea1-b70279640f67
vulnerability,CVE-2024-13687,vulnerability--cedd1de3-beff-4bff-ba0c-b5590b667e2e
vulnerability,CVE-2024-13535,vulnerability--cc134ff8-144e-45ed-8e57-31dccc376b18
vulnerability,CVE-2024-13743,vulnerability--0cf0e322-90e4-4ed2-9634-c3cbf8944dea
vulnerability,CVE-2024-13691,vulnerability--5e8e350b-b21b-4d84-a886-fd5e1c529486
vulnerability,CVE-2024-13689,vulnerability--c23ccb6b-dff5-49b3-8919-d1aed3131131
vulnerability,CVE-2024-13438,vulnerability--8a3730fe-2fd5-4cb6-9a44-70f7099a8dc4
vulnerability,CVE-2024-13740,vulnerability--74e4ca43-58fe-4b13-ba31-e9765fe1f349
vulnerability,CVE-2024-13555,vulnerability--c591e376-4655-4954-930d-9e24674a1655
vulnerability,CVE-2024-13522,vulnerability--247a5645-4045-426e-80ee-dcd491d94c0a
vulnerability,CVE-2024-13636,vulnerability--f387d904-32cc-43ae-a94b-a7c81510a5ee
vulnerability,CVE-2024-13783,vulnerability--df97b6fe-ae68-4f07-9916-61303bad2aa5
vulnerability,CVE-2024-13582,vulnerability--e0467a3b-6141-43bc-9fa6-d4a072fb97b1
vulnerability,CVE-2024-13316,vulnerability--f9843f77-b9c7-40cb-993e-546492a313dc
vulnerability,CVE-2024-13581,vulnerability--397fe930-b553-4014-a731-d0a5277b9b0c
vulnerability,CVE-2024-13609,vulnerability--829a16a3-f1b2-46d1-b82b-42ffe248bab3
vulnerability,CVE-2024-13577,vulnerability--6af57fd1-b8b2-4eaf-88da-beb963509fbf
vulnerability,CVE-2024-13576,vulnerability--f75470ea-e017-47f0-877b-3c8cb5a2c228
vulnerability,CVE-2024-13588,vulnerability--782da1c8-d8d9-4228-9084-df4a5b774ce3
vulnerability,CVE-2024-13725,vulnerability--a5abf5a0-3072-41c8-9002-92eaad39910d
vulnerability,CVE-2024-13573,vulnerability--0769785a-d6a6-45b9-af59-cc16706647b1
vulnerability,CVE-2024-13575,vulnerability--9cf64ee4-d16c-4663-877b-e9bd55e41660
vulnerability,CVE-2024-13587,vulnerability--680f56d4-8422-439c-841a-3bbe3542a042
vulnerability,CVE-2024-13579,vulnerability--6da7e931-0a19-40b5-bea6-c9539bba3a2f
vulnerability,CVE-2024-13501,vulnerability--fe38dbe5-7e56-41ec-9378-87ebe88d3db8
vulnerability,CVE-2024-13622,vulnerability--c3e6a4f5-f138-4a16-b8aa-f65085efd567
vulnerability,CVE-2024-13677,vulnerability--36010adf-ee56-4371-96c2-ab8a0af1e7e1
vulnerability,CVE-2024-13681,vulnerability--b21739f4-8538-4f6c-8aef-322888733394
vulnerability,CVE-2024-13595,vulnerability--7f3cfe32-2a64-4d07-84ba-4f028733537d
vulnerability,CVE-2024-13741,vulnerability--dba22f9b-76fa-4164-acd1-7a6bfbb998b0
vulnerability,CVE-2024-13852,vulnerability--3cd0f770-14d8-4d95-8c20-0dfcc48858df
vulnerability,CVE-2024-13565,vulnerability--6a48c780-6fe2-4689-b875-46dd18e78516
vulnerability,CVE-2024-13684,vulnerability--b02c1ba6-eaba-4d37-a924-ad9c8dd10d93
vulnerability,CVE-2024-13315,vulnerability--636506ef-eb04-4f85-ae59-c540fb3f9200
vulnerability,CVE-2024-13538,vulnerability--cbe49500-8f1a-4c11-8b9e-8a7fcd8c897f
vulnerability,CVE-2024-13795,vulnerability--89430c62-3639-4ee0-ba83-bb5ec273c692
vulnerability,CVE-2024-13718,vulnerability--8fb54a52-5714-48a0-bc09-6abc01446a2a
vulnerability,CVE-2024-13369,vulnerability--362b338a-48e4-47c9-835d-8eac4b5b12c4
vulnerability,CVE-2024-13540,vulnerability--7f102661-92d2-45ed-9ba9-649e8f9dcf0e
vulnerability,CVE-2024-13508,vulnerability--61c83e3c-1358-4728-96ca-c8bb26d7be11
vulnerability,CVE-2024-13556,vulnerability--0c179b7e-9289-47ed-830f-22a9a9e3e9a9
vulnerability,CVE-2024-13465,vulnerability--684c2753-d1e0-478a-849c-f5eefd3a2b30
vulnerability,CVE-2024-13704,vulnerability--ec012576-15f7-4f2f-a1e9-8e7fc33f449a
vulnerability,CVE-2024-13797,vulnerability--c8e6bcce-b113-4851-a844-22ccaf7f56b0
vulnerability,CVE-2024-13848,vulnerability--7e41f963-c1fb-483e-a681-7dfb309a4cc2
vulnerability,CVE-2024-13464,vulnerability--c7646ea4-30af-472d-acc7-157d49f05363
vulnerability,CVE-2024-13667,vulnerability--dd5aaa21-af98-49dd-8d99-eeb530369cbf
vulnerability,CVE-2024-11895,vulnerability--cd7a23c7-bca0-47e6-b915-f01c62e70874
vulnerability,CVE-2024-11376,vulnerability--91374196-a000-49ed-91e6-457118630cf8
vulnerability,CVE-2024-56171,vulnerability--8032b82c-3fed-4909-a7bf-e12f87c4dc79
vulnerability,CVE-2024-56000,vulnerability--6d12d2ce-3a24-41db-9e8b-d56392818111
vulnerability,CVE-2024-56883,vulnerability--51e81b16-0993-4ec5-b6ec-16484ce0b81c
vulnerability,CVE-2024-56882,vulnerability--a533f4b4-761f-470a-8ad2-93ca6f9a1dbf
vulnerability,CVE-2025-1269,vulnerability--4eddd6bd-2c03-4f21-8e3a-dc04a8eea27e
vulnerability,CVE-2025-1390,vulnerability--e9bdb094-2ef2-4177-9e8d-895b2a56a716
vulnerability,CVE-2025-1023,vulnerability--f3bf4c29-3a75-4b0f-b9ab-155d376d1912
vulnerability,CVE-2025-1035,vulnerability--7292e3c1-b195-4fe7-a13e-5d7f38bd3179
vulnerability,CVE-2025-1414,vulnerability--87f044a1-a2fa-45eb-84f2-d7a873411289
vulnerability,CVE-2025-21608,vulnerability--ab65b8b2-e3af-4048-ac30-202967388a12
vulnerability,CVE-2025-21702,vulnerability--a5e75043-c4a0-46fa-a722-698d8ddb1749
vulnerability,CVE-2025-21703,vulnerability--9e25e127-e043-493e-bc0a-7ea8e99ad697
vulnerability,CVE-2025-26608,vulnerability--150b3385-298d-4061-b561-248575e3cbd7
vulnerability,CVE-2025-26058,vulnerability--58f44fff-bd3b-4baa-9d82-68b3b4b331ee
vulnerability,CVE-2025-26615,vulnerability--0b3a3c3d-adb6-4e0d-a9c4-6bf9f1819400
vulnerability,CVE-2025-26620,vulnerability--96292771-7ce7-4a41-bc14-31a96b9d807c
vulnerability,CVE-2025-26610,vulnerability--9eeda798-fa8e-4feb-aa44-c2640fbead2c
vulnerability,CVE-2025-26603,vulnerability--f8cffd07-eba8-40d8-a750-b82ba8a57dc1
vulnerability,CVE-2025-26606,vulnerability--6a3b5b43-542b-4ed2-8825-1ad2896d185c
vulnerability,CVE-2025-26611,vulnerability--1109ad50-9dd8-41b2-b156-b7019909d957
vulnerability,CVE-2025-26613,vulnerability--bdfc3b45-297f-43ee-ae28-387144df76cf
vulnerability,CVE-2025-26617,vulnerability--20c7b820-c025-41d1-848a-0cec288a5947
vulnerability,CVE-2025-26624,vulnerability--aacbc61d-3184-404a-8274-c3eea8a52a5a
vulnerability,CVE-2025-26609,vulnerability--24a61aff-e2f4-494f-ad6d-32e3704b3b27
vulnerability,CVE-2025-26612,vulnerability--a9a689fc-4f48-4d06-835c-f45398eb0a51
vulnerability,CVE-2025-26607,vulnerability--a41fd90a-2bad-4085-a4c0-1896cbe89cd8
vulnerability,CVE-2025-26623,vulnerability--d35bdde5-81e6-4590-8ea7-9821dbdd6270
vulnerability,CVE-2025-26604,vulnerability--b9535289-2bea-49b6-90fa-9ed7ee527087
vulnerability,CVE-2025-26614,vulnerability--5214f9a6-6a7e-4910-860b-7af1c96bbc6a
vulnerability,CVE-2025-26465,vulnerability--335c8e32-1194-4162-b42d-a4900f0b11d9
vulnerability,CVE-2025-26605,vulnerability--3d28dd4a-3d0b-40e4-99b5-092866b72277
vulnerability,CVE-2025-26616,vulnerability--7ed2ad8f-c516-4de1-a608-fa3153c15b48
vulnerability,CVE-2025-22657,vulnerability--febd4c64-4407-438e-b5b8-e164a3eee340
vulnerability,CVE-2025-22663,vulnerability--b066af11-61b3-4ecc-bf58-a95b0714acdc
vulnerability,CVE-2025-22654,vulnerability--a9bd003c-8a79-4cbf-8aea-cd88e5bcd87e
vulnerability,CVE-2025-22919,vulnerability--add9b242-13e3-458b-932a-dc11d0a5d134
vulnerability,CVE-2025-22656,vulnerability--77f113b8-7e51-46b6-bb55-c686f48aec5d
vulnerability,CVE-2025-22921,vulnerability--da319058-c0c6-43ed-8b19-04ce4202d744
vulnerability,CVE-2025-22920,vulnerability--cace797f-9b17-4077-ade9-e561c7ce7a0f
vulnerability,CVE-2025-22207,vulnerability--1c82aa12-8c30-4437-b41d-24579ecf85e3
vulnerability,CVE-2025-22639,vulnerability--524862f3-db88-4346-87e7-70b5d33d6bf5
vulnerability,CVE-2025-22645,vulnerability--844b697c-47b1-4405-906c-95d5dc866a1c
vulnerability,CVE-2025-22650,vulnerability--a1c7431b-fa3f-4f3d-87de-bd2ddeadcdf7
vulnerability,CVE-2025-27013,vulnerability--9ee81a4a-a159-4345-b132-a83ea8ac6600
vulnerability,CVE-2025-27016,vulnerability--e8f31fd9-0c03-4c00-ab53-fc4f2772c92a
vulnerability,CVE-2025-27113,vulnerability--545f86af-fdbf-4fcf-8771-4e6d95996427
vulnerability,CVE-2025-24928,vulnerability--1572c917-2f43-4483-aab5-7a596522063e
vulnerability,CVE-2025-24894,vulnerability--9ae7d0c2-9933-40fc-bb63-990de52b0ca3
vulnerability,CVE-2025-24895,vulnerability--2914621b-3918-4549-88db-b31edc72a7bc
vulnerability,CVE-2025-25300,vulnerability--b7e73736-4f3d-469d-b21f-0d4fc258f693
vulnerability,CVE-2025-25468,vulnerability--bcf58812-fec9-4ac1-8ac5-e29af2da211e
vulnerability,CVE-2025-25305,vulnerability--254ab610-6686-4e56-b4a9-c8162c390816
vulnerability,CVE-2025-25473,vulnerability--4dad17a2-1514-489b-9546-a9e1adc7d562
vulnerability,CVE-2025-25893,vulnerability--d08e6993-63d4-4e13-962d-b65380974d2f
vulnerability,CVE-2025-25223,vulnerability--4ad9bd51-c5f7-409d-9dec-95caaafd08d3
vulnerability,CVE-2025-25221,vulnerability--822c6c02-527f-4c47-ae58-af3c2595e555
vulnerability,CVE-2025-25471,vulnerability--704ab799-48a4-45e9-81dd-00e4154ec230
vulnerability,CVE-2025-25224,vulnerability--200a780a-2fe8-48f1-b735-3c609370a8e1
vulnerability,CVE-2025-25891,vulnerability--2cf3fc1f-d0ea-4e8c-82d5-73dfd57f0672
vulnerability,CVE-2025-25469,vulnerability--f5bbef65-4e07-47ea-a691-ec784549ad67
vulnerability,CVE-2025-25467,vulnerability--90f1811f-2546-41e9-9fa7-3184dbe21270
vulnerability,CVE-2025-25474,vulnerability--f0311a36-9e7f-4b98-ae2f-21bf35e49362
vulnerability,CVE-2025-25472,vulnerability--b9a213e3-0a86-4976-996e-39dda023488f
vulnerability,CVE-2025-25284,vulnerability--56fca4d4-ed7b-4404-aa74-26386a02f288
vulnerability,CVE-2025-25222,vulnerability--9ad1b613-aa1e-4a89-ab0b-a487a466a217
vulnerability,CVE-2025-25894,vulnerability--eb2102ad-3764-4b94-9170-5e5e7f357b21
vulnerability,CVE-2025-25475,vulnerability--f44f4109-f063-4a41-95f0-8fbcdef8cd4c
vulnerability,CVE-2025-25895,vulnerability--288e4ab6-610b-42fa-b84a-f8079373c211
vulnerability,CVE-2025-25896,vulnerability--b967c7c7-e36c-4e7c-b680-0fe256f0b387
vulnerability,CVE-2025-25892,vulnerability--4bb0ee34-6ad9-431e-ba3a-dafcff2ea479
vulnerability,CVE-2025-0981,vulnerability--d0cf6585-3b71-4fd3-b06d-c56413aaa5fc
vulnerability,CVE-2025-0805,vulnerability--5cbab548-edb3-4a63-bc93-662ed1c3fdc2
vulnerability,CVE-2025-0425,vulnerability--db70f2a3-cc1b-4ea2-8d4b-fcd6b8ac77ce
vulnerability,CVE-2025-0521,vulnerability--221da4f3-a0be-4f18-bfa1-4abd6a41ac82
vulnerability,CVE-2025-0817,vulnerability--837c03d0-9e11-40ac-9371-b3e44355f4af
vulnerability,CVE-2025-0864,vulnerability--0dd325a0-d86e-4e74-b692-84038de0f809
vulnerability,CVE-2025-0423,vulnerability--d88a4967-138d-43f6-b1ac-ce8d4be2bf98
vulnerability,CVE-2025-0796,vulnerability--5566356b-888a-408e-a412-6baad41d1e19
vulnerability,CVE-2025-0424,vulnerability--432c6971-8f9d-4b85-bced-6f2e66fdc4c6
vulnerability,CVE-2025-0622,vulnerability--b178f571-9a15-4b3e-ad77-fc8e3072ed1b
vulnerability,CVE-2025-0422,vulnerability--ed67e855-6204-4e3f-a261-ee17ebf8a157
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6ff1c474-aa1e-41a6-b780-31f44d664cee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0769785a-d6a6-45b9-af59-cc16706647b1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-19T00:37:16.157311Z",
"modified": "2025-02-19T00:37:16.157311Z",
"name": "CVE-2024-13573",
"description": "The Zigaform – Form Builder Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zgfm_rfvar' shortcode in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13573"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--21296b55-edbd-47ae-bc4f-c1e6aafadf48",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b2f9aa7-6c55-46c3-8442-bee2bd86b9c5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-19T00:37:14.610572Z",
"modified": "2025-02-19T00:37:14.610572Z",
"name": "CVE-2024-57049",
"description": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57049"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--321ec57d-ec11-4240-9198-d28fbc343f70",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b3a3c3d-adb6-4e0d-a9c4-6bf9f1819400",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-19T00:37:19.795467Z",
"modified": "2025-02-19T00:37:19.795467Z",
"name": "CVE-2025-26615",
"description": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `examples.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-26615"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3b39c163-bb6d-4383-94a8-6136fa994582",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c179b7e-9289-47ed-830f-22a9a9e3e9a9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-19T00:37:16.19386Z",
"modified": "2025-02-19T00:37:16.19386Z",
"name": "CVE-2024-13556",
"description": "The Affiliate Links: WordPress Plugin for Link Cloaking and Link Management plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.1 via deserialization of untrusted input from an file export. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13556"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ca6af714-1112-44b3-ad46-e29f783e3bf1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cf0e322-90e4-4ed2-9634-c3cbf8944dea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-19T00:37:16.130466Z",
"modified": "2025-02-19T00:37:16.130466Z",
"name": "CVE-2024-13743",
"description": "The Wonder Video Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wonderplugin_video shortcode in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13743"
}
]
}
]
}
Loading

0 comments on commit 1594881

Please sign in to comment.