{"vulnerability": "cve-2024-9528", "sightings": [{"uuid": "6ae23a61-0753-40bc-9b5c-5e86dc1cd288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/cvedetector/7041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9528 - Fluent Forms for WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9528 \nPublished : Oct. 5, 2024, 3:15 a.m. | 37\u00a0minutes ago \nDescription : The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag &amp; Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T06:15:09.000000Z"}, {"uuid": "bed4aee4-1675-4907-abb1-e122eacf20bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/HackerArsenal/524", "content": "\u203c\ufe0f CVE-2024-9528 \u203c\ufe0f\n\nThe Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag  Drop WP Form Builder plugin for WordPress is vulnerable to Stored CrossSite Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms administrator by default, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-10-05T11:40:17.000000Z"}]}