<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:21:15.492123+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/457a1e49-bef6-44d4-a550-0eb6a814a683/export</id>
    <title>457a1e49-bef6-44d4-a550-0eb6a814a683</title>
    <updated>2026-05-04T19:21:15.897844+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "457a1e49-bef6-44d4-a550-0eb6a814a683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8246", "type": "seen", "source": "https://t.me/cvedetector/5669", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8246 - WordPress Frontend Content Forms for User Submissions Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8246 \nPublished : Sept. 14, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-14T07:20:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/457a1e49-bef6-44d4-a550-0eb6a814a683/export"/>
    <published>2024-09-14T07:20:44+00:00</published>
  </entry>
</feed>
