{"vulnerability": "CVE-2024-8672", "sightings": [{"uuid": "0ca9370c-9738-4279-88c5-f2fde13e98e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113560012299864959", "content": "", "creation_timestamp": "2024-11-28T10:04:34.795671Z"}, {"uuid": "62cbf8f2-e808-48f7-b18d-a25c013e9580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "seen", "source": "https://t.me/CyberBulletin/26672", "content": "\u26a1\ufe0fCVE-2024-8672 (CVSS 9.9): Critical Flaw in Widget Options Plugin Threatens 100,000+ Websites.\n\n#CyberBulletin", "creation_timestamp": "2024-12-01T08:41:51.000000Z"}, {"uuid": "d45d6e9d-163c-4aaa-9cb9-00eb169009ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/20931", "content": "https://github.com/Chocapikk/CVE-2024-8672\n\nWidget Options \u2013 The #1 WordPress Widget &amp; Block Control Plugin &lt;= 4.0.7 - Authenticated (Contributor+) Remote Code Execution\n#github #exploit #poc", "creation_timestamp": "2024-12-05T03:43:58.000000Z"}, {"uuid": "3ffe1c9a-e4b7-491f-92e6-05d460df0d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "seen", "source": "https://t.me/CyberBulletin/1660", "content": "\u26a1\ufe0fCVE-2024-8672 (CVSS 9.9): Critical Flaw in Widget Options Plugin Threatens 100,000+ Websites.\n\n#CyberBulletin", "creation_timestamp": "2024-12-01T08:41:51.000000Z"}, {"uuid": "383201fd-1792-40b3-bef7-7bb211a6e34e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "seen", "source": "https://t.me/Rootsec_2/5375", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-05T07:26:57.000000Z"}, {"uuid": "c21d9ee3-79ba-4cab-b07f-f381981024d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11517", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-04T19:24:08.000000Z"}, {"uuid": "dcc21b38-c8c1-4c61-b0b5-370916303f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8672", "type": "seen", "source": "https://t.me/DEVIL_La_RSx/2294", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-04T17:10:28.000000Z"}]}