<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:20:56 +0000</lastBuildDate>
    <item>
      <title>457a1e49-bef6-44d4-a550-0eb6a814a683</title>
      <link>https://vulnerability.circl.lu/sighting/457a1e49-bef6-44d4-a550-0eb6a814a683/export</link>
      <description>{"uuid": "457a1e49-bef6-44d4-a550-0eb6a814a683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8246", "type": "seen", "source": "https://t.me/cvedetector/5669", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8246 - WordPress Frontend Content Forms for User Submissions Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8246 \nPublished : Sept. 14, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-14T07:20:44.000000Z"}</description>
      <content:encoded>{"uuid": "457a1e49-bef6-44d4-a550-0eb6a814a683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8246", "type": "seen", "source": "https://t.me/cvedetector/5669", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8246 - WordPress Frontend Content Forms for User Submissions Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8246 \nPublished : Sept. 14, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-14T07:20:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/457a1e49-bef6-44d4-a550-0eb6a814a683/export</guid>
      <pubDate>Sat, 14 Sep 2024 07:20:44 +0000</pubDate>
    </item>
  </channel>
</rss>
