<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 00:39:14 +0000</lastBuildDate>
    <item>
      <title>cd648adc-cdc2-49bb-9fd0-d135c5e63707</title>
      <link>https://vulnerability.circl.lu/sighting/cd648adc-cdc2-49bb-9fd0-d135c5e63707/export</link>
      <description>{"uuid": "cd648adc-cdc2-49bb-9fd0-d135c5e63707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "seen", "source": "https://t.me/cibsecurity/21489", "content": "\u203c CVE-2020-35948 \u203c\n\nAn issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-01T07:32:27.000000Z"}</description>
      <content:encoded>{"uuid": "cd648adc-cdc2-49bb-9fd0-d135c5e63707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "seen", "source": "https://t.me/cibsecurity/21489", "content": "\u203c CVE-2020-35948 \u203c\n\nAn issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-01T07:32:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd648adc-cdc2-49bb-9fd0-d135c5e63707/export</guid>
      <pubDate>Fri, 01 Jan 2021 07:32:27 +0000</pubDate>
    </item>
    <item>
      <title>e800766c-3573-4ea0-afce-542c44473940</title>
      <link>https://vulnerability.circl.lu/sighting/e800766c-3573-4ea0-afce-542c44473940/export</link>
      <description>{"uuid": "e800766c-3573-4ea0-afce-542c44473940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "published-proof-of-concept", "source": "Telegram/eMoVbCeI-n-jaFKeB-W9ZjnKBEe6KGFrv-r960DcFriPRg", "content": "", "creation_timestamp": "2021-07-10T16:29:07.000000Z"}</description>
      <content:encoded>{"uuid": "e800766c-3573-4ea0-afce-542c44473940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "published-proof-of-concept", "source": "Telegram/eMoVbCeI-n-jaFKeB-W9ZjnKBEe6KGFrv-r960DcFriPRg", "content": "", "creation_timestamp": "2021-07-10T16:29:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e800766c-3573-4ea0-afce-542c44473940/export</guid>
      <pubDate>Sat, 10 Jul 2021 16:29:07 +0000</pubDate>
    </item>
    <item>
      <title>e0f2b4a3-4f0c-44e5-978e-1caa78bf22ee</title>
      <link>https://vulnerability.circl.lu/sighting/e0f2b4a3-4f0c-44e5-978e-1caa78bf22ee/export</link>
      <description>{"uuid": "e0f2b4a3-4f0c-44e5-978e-1caa78bf22ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/732", "content": "CVE-2020-35948 wordpress Plugin XCloner 4.2.12 \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T04:42:20.000000Z"}</description>
      <content:encoded>{"uuid": "e0f2b4a3-4f0c-44e5-978e-1caa78bf22ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35948", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/732", "content": "CVE-2020-35948 wordpress Plugin XCloner 4.2.12 \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T04:42:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e0f2b4a3-4f0c-44e5-978e-1caa78bf22ee/export</guid>
      <pubDate>Tue, 21 Sep 2021 04:42:20 +0000</pubDate>
    </item>
  </channel>
</rss>
