<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 03:15:18 +0000</lastBuildDate>
    <item>
      <title>055112ed-7937-4d72-984e-d47f5b010a53</title>
      <link>https://vulnerability.circl.lu/sighting/055112ed-7937-4d72-984e-d47f5b010a53/export</link>
      <description>{"uuid": "055112ed-7937-4d72-984e-d47f5b010a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24545", "type": "seen", "source": "https://t.me/cibsecurity/30317", "content": "\u203c CVE-2021-24545 \u203c\n\nThe WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-11T14:24:32.000000Z"}</description>
      <content:encoded>{"uuid": "055112ed-7937-4d72-984e-d47f5b010a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24545", "type": "seen", "source": "https://t.me/cibsecurity/30317", "content": "\u203c CVE-2021-24545 \u203c\n\nThe WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-11T14:24:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/055112ed-7937-4d72-984e-d47f5b010a53/export</guid>
      <pubDate>Mon, 11 Oct 2021 14:24:32 +0000</pubDate>
    </item>
  </channel>
</rss>
